Dec 13 14:32:04.108007 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:32:04.108042 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:32:04.108058 kernel: BIOS-provided physical RAM map: Dec 13 14:32:04.108069 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 14:32:04.108080 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 14:32:04.108091 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 14:32:04.108107 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Dec 13 14:32:04.108119 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Dec 13 14:32:04.108131 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Dec 13 14:32:04.108142 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 14:32:04.108154 kernel: NX (Execute Disable) protection: active Dec 13 14:32:04.108165 kernel: SMBIOS 2.7 present. Dec 13 14:32:04.108177 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Dec 13 14:32:04.108188 kernel: Hypervisor detected: KVM Dec 13 14:32:04.108206 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 14:32:04.108219 kernel: kvm-clock: cpu 0, msr 4719a001, primary cpu clock Dec 13 14:32:04.108231 kernel: kvm-clock: using sched offset of 8389056007 cycles Dec 13 14:32:04.108244 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 14:32:04.108257 kernel: tsc: Detected 2499.990 MHz processor Dec 13 14:32:04.108270 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:32:04.108286 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:32:04.108299 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Dec 13 14:32:04.108312 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:32:04.108325 kernel: Using GB pages for direct mapping Dec 13 14:32:04.108338 kernel: ACPI: Early table checksum verification disabled Dec 13 14:32:04.108348 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Dec 13 14:32:04.108361 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Dec 13 14:32:04.108375 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Dec 13 14:32:04.108388 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Dec 13 14:32:04.108404 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Dec 13 14:32:04.108417 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Dec 13 14:32:04.108430 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Dec 13 14:32:04.108442 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Dec 13 14:32:04.108455 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Dec 13 14:32:04.108467 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Dec 13 14:32:04.108542 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Dec 13 14:32:04.108554 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Dec 13 14:32:04.108570 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Dec 13 14:32:04.108583 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Dec 13 14:32:04.108596 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Dec 13 14:32:04.108615 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Dec 13 14:32:04.108629 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Dec 13 14:32:04.108643 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Dec 13 14:32:04.108657 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Dec 13 14:32:04.108673 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Dec 13 14:32:04.108687 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Dec 13 14:32:04.108715 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Dec 13 14:32:04.108726 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 14:32:04.108736 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 14:32:04.108747 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Dec 13 14:32:04.108757 kernel: NUMA: Initialized distance table, cnt=1 Dec 13 14:32:04.108767 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Dec 13 14:32:04.108782 kernel: Zone ranges: Dec 13 14:32:04.108794 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:32:04.108806 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Dec 13 14:32:04.108818 kernel: Normal empty Dec 13 14:32:04.108830 kernel: Movable zone start for each node Dec 13 14:32:04.108841 kernel: Early memory node ranges Dec 13 14:32:04.108851 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 14:32:04.108862 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Dec 13 14:32:04.108873 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Dec 13 14:32:04.108886 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:32:04.108899 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 14:32:04.108911 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Dec 13 14:32:04.108924 kernel: ACPI: PM-Timer IO Port: 0xb008 Dec 13 14:32:04.108937 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 14:32:04.108950 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Dec 13 14:32:04.108963 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 14:32:04.108976 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:32:04.108989 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 14:32:04.109005 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 14:32:04.109018 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:32:04.109031 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 14:32:04.109044 kernel: TSC deadline timer available Dec 13 14:32:04.109057 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 14:32:04.109070 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Dec 13 14:32:04.109083 kernel: Booting paravirtualized kernel on KVM Dec 13 14:32:04.109096 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:32:04.109109 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 14:32:04.109123 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 14:32:04.109136 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 14:32:04.109149 kernel: pcpu-alloc: [0] 0 1 Dec 13 14:32:04.109161 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0 Dec 13 14:32:04.109173 kernel: kvm-guest: PV spinlocks enabled Dec 13 14:32:04.109185 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 14:32:04.109198 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Dec 13 14:32:04.109211 kernel: Policy zone: DMA32 Dec 13 14:32:04.109225 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:32:04.109242 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:32:04.109256 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:32:04.109269 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 14:32:04.109283 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:32:04.109296 kernel: Memory: 1934420K/2057760K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 123080K reserved, 0K cma-reserved) Dec 13 14:32:04.109309 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:32:04.109324 kernel: Kernel/User page tables isolation: enabled Dec 13 14:32:04.109337 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:32:04.109354 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:32:04.109366 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:32:04.109379 kernel: rcu: RCU event tracing is enabled. Dec 13 14:32:04.109391 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:32:04.109402 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:32:04.109414 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:32:04.109425 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:32:04.109437 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:32:04.109449 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 13 14:32:04.109463 kernel: random: crng init done Dec 13 14:32:04.109551 kernel: Console: colour VGA+ 80x25 Dec 13 14:32:04.109564 kernel: printk: console [ttyS0] enabled Dec 13 14:32:04.109576 kernel: ACPI: Core revision 20210730 Dec 13 14:32:04.109588 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Dec 13 14:32:04.109773 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:32:04.109791 kernel: x2apic enabled Dec 13 14:32:04.109804 kernel: Switched APIC routing to physical x2apic. Dec 13 14:32:04.109817 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x2409306edf7, max_idle_ns: 440795259305 ns Dec 13 14:32:04.109829 kernel: Calibrating delay loop (skipped) preset value.. 4999.98 BogoMIPS (lpj=2499990) Dec 13 14:32:04.109844 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 14:32:04.109856 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 14:32:04.109868 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:32:04.109890 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 14:32:04.109905 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:32:04.109917 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:32:04.109930 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Dec 13 14:32:04.109942 kernel: RETBleed: Vulnerable Dec 13 14:32:04.109955 kernel: Speculative Store Bypass: Vulnerable Dec 13 14:32:04.109968 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:32:04.109980 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:32:04.109993 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 14:32:04.110007 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:32:04.110024 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:32:04.110037 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:32:04.110052 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Dec 13 14:32:04.110065 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Dec 13 14:32:04.110079 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Dec 13 14:32:04.110090 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Dec 13 14:32:04.110106 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Dec 13 14:32:04.110117 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Dec 13 14:32:04.110248 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:32:04.110265 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Dec 13 14:32:04.110279 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Dec 13 14:32:04.110292 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Dec 13 14:32:04.110305 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Dec 13 14:32:04.110318 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Dec 13 14:32:04.110331 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Dec 13 14:32:04.110344 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Dec 13 14:32:04.110357 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:32:04.110373 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:32:04.110386 kernel: LSM: Security Framework initializing Dec 13 14:32:04.110398 kernel: SELinux: Initializing. Dec 13 14:32:04.110411 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:32:04.110424 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:32:04.110437 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Dec 13 14:32:04.110449 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Dec 13 14:32:04.110462 kernel: signal: max sigframe size: 3632 Dec 13 14:32:04.110475 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:32:04.110488 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 14:32:04.110500 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:32:04.110516 kernel: x86: Booting SMP configuration: Dec 13 14:32:04.110528 kernel: .... node #0, CPUs: #1 Dec 13 14:32:04.110541 kernel: kvm-clock: cpu 1, msr 4719a041, secondary cpu clock Dec 13 14:32:04.110554 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0 Dec 13 14:32:04.110567 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Dec 13 14:32:04.110581 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 14:32:04.110593 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:32:04.110606 kernel: smpboot: Max logical packages: 1 Dec 13 14:32:04.110622 kernel: smpboot: Total of 2 processors activated (9999.96 BogoMIPS) Dec 13 14:32:04.110635 kernel: devtmpfs: initialized Dec 13 14:32:04.110647 kernel: x86/mm: Memory block size: 128MB Dec 13 14:32:04.110660 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:32:04.110672 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:32:04.110685 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:32:04.110784 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:32:04.110800 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:32:04.110813 kernel: audit: type=2000 audit(1734100323.444:1): state=initialized audit_enabled=0 res=1 Dec 13 14:32:04.110829 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:32:04.110841 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:32:04.110854 kernel: cpuidle: using governor menu Dec 13 14:32:04.110928 kernel: ACPI: bus type PCI registered Dec 13 14:32:04.110946 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:32:04.110959 kernel: dca service started, version 1.12.1 Dec 13 14:32:04.110973 kernel: PCI: Using configuration type 1 for base access Dec 13 14:32:04.110985 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:32:04.110998 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:32:04.111013 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:32:04.111026 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:32:04.111039 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:32:04.111051 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:32:04.111064 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:32:04.111076 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:32:04.111088 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:32:04.111101 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:32:04.111113 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Dec 13 14:32:04.111128 kernel: ACPI: Interpreter enabled Dec 13 14:32:04.111140 kernel: ACPI: PM: (supports S0 S5) Dec 13 14:32:04.111153 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:32:04.111165 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:32:04.111178 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Dec 13 14:32:04.111190 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 14:32:04.111387 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:32:04.111518 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 13 14:32:04.111540 kernel: acpiphp: Slot [3] registered Dec 13 14:32:04.111554 kernel: acpiphp: Slot [4] registered Dec 13 14:32:04.111568 kernel: acpiphp: Slot [5] registered Dec 13 14:32:04.111582 kernel: acpiphp: Slot [6] registered Dec 13 14:32:04.111592 kernel: acpiphp: Slot [7] registered Dec 13 14:32:04.111604 kernel: acpiphp: Slot [8] registered Dec 13 14:32:04.112554 kernel: acpiphp: Slot [9] registered Dec 13 14:32:04.112573 kernel: acpiphp: Slot [10] registered Dec 13 14:32:04.112587 kernel: acpiphp: Slot [11] registered Dec 13 14:32:04.112606 kernel: acpiphp: Slot [12] registered Dec 13 14:32:04.112620 kernel: acpiphp: Slot [13] registered Dec 13 14:32:04.112634 kernel: acpiphp: Slot [14] registered Dec 13 14:32:04.112647 kernel: acpiphp: Slot [15] registered Dec 13 14:32:04.112660 kernel: acpiphp: Slot [16] registered Dec 13 14:32:04.112674 kernel: acpiphp: Slot [17] registered Dec 13 14:32:04.112686 kernel: acpiphp: Slot [18] registered Dec 13 14:32:04.112714 kernel: acpiphp: Slot [19] registered Dec 13 14:32:04.112729 kernel: acpiphp: Slot [20] registered Dec 13 14:32:04.112746 kernel: acpiphp: Slot [21] registered Dec 13 14:32:04.112762 kernel: acpiphp: Slot [22] registered Dec 13 14:32:04.112775 kernel: acpiphp: Slot [23] registered Dec 13 14:32:04.112790 kernel: acpiphp: Slot [24] registered Dec 13 14:32:04.112805 kernel: acpiphp: Slot [25] registered Dec 13 14:32:04.112819 kernel: acpiphp: Slot [26] registered Dec 13 14:32:04.112835 kernel: acpiphp: Slot [27] registered Dec 13 14:32:04.112851 kernel: acpiphp: Slot [28] registered Dec 13 14:32:04.112867 kernel: acpiphp: Slot [29] registered Dec 13 14:32:04.112882 kernel: acpiphp: Slot [30] registered Dec 13 14:32:04.112899 kernel: acpiphp: Slot [31] registered Dec 13 14:32:04.112912 kernel: PCI host bridge to bus 0000:00 Dec 13 14:32:04.113154 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:32:04.113400 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 14:32:04.113571 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:32:04.113779 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Dec 13 14:32:04.113987 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 14:32:04.114148 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 13 14:32:04.114301 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Dec 13 14:32:04.114446 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Dec 13 14:32:04.114576 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Dec 13 14:32:04.114973 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Dec 13 14:32:04.115382 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Dec 13 14:32:04.115525 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Dec 13 14:32:04.115762 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Dec 13 14:32:04.116061 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Dec 13 14:32:04.116207 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Dec 13 14:32:04.116344 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Dec 13 14:32:04.116563 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Dec 13 14:32:04.116726 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Dec 13 14:32:04.116857 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Dec 13 14:32:04.117000 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 14:32:04.117137 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Dec 13 14:32:04.117272 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Dec 13 14:32:04.117417 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Dec 13 14:32:04.117734 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Dec 13 14:32:04.117760 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 14:32:04.117781 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 14:32:04.117795 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:32:04.117811 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 14:32:04.117825 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 13 14:32:04.117839 kernel: iommu: Default domain type: Translated Dec 13 14:32:04.117853 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:32:04.118077 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Dec 13 14:32:04.118205 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 14:32:04.118337 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Dec 13 14:32:04.118361 kernel: vgaarb: loaded Dec 13 14:32:04.118376 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:32:04.118392 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:32:04.118407 kernel: PTP clock support registered Dec 13 14:32:04.118423 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:32:04.118438 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:32:04.118453 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 14:32:04.118468 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Dec 13 14:32:04.118483 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Dec 13 14:32:04.118501 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Dec 13 14:32:04.118515 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 14:32:04.118530 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:32:04.118546 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:32:04.118561 kernel: pnp: PnP ACPI init Dec 13 14:32:04.118576 kernel: pnp: PnP ACPI: found 5 devices Dec 13 14:32:04.118592 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:32:04.118607 kernel: NET: Registered PF_INET protocol family Dec 13 14:32:04.118624 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:32:04.118639 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 14:32:04.118654 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:32:04.118669 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:32:04.118684 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 14:32:04.118782 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 14:32:04.118799 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:32:04.118814 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:32:04.118829 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:32:04.118848 kernel: NET: Registered PF_XDP protocol family Dec 13 14:32:04.119055 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 14:32:04.119175 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 14:32:04.119284 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 14:32:04.119391 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Dec 13 14:32:04.119520 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 14:32:04.119645 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Dec 13 14:32:04.119668 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:32:04.119684 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 14:32:04.119711 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x2409306edf7, max_idle_ns: 440795259305 ns Dec 13 14:32:04.119726 kernel: clocksource: Switched to clocksource tsc Dec 13 14:32:04.119741 kernel: Initialise system trusted keyrings Dec 13 14:32:04.119756 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 14:32:04.119771 kernel: Key type asymmetric registered Dec 13 14:32:04.119786 kernel: Asymmetric key parser 'x509' registered Dec 13 14:32:04.119801 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:32:04.119819 kernel: io scheduler mq-deadline registered Dec 13 14:32:04.119832 kernel: io scheduler kyber registered Dec 13 14:32:04.119847 kernel: io scheduler bfq registered Dec 13 14:32:04.119862 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:32:04.119877 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:32:04.119892 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:32:04.119907 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 14:32:04.119922 kernel: i8042: Warning: Keylock active Dec 13 14:32:04.119937 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:32:04.119952 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:32:04.120409 kernel: rtc_cmos 00:00: RTC can wake from S4 Dec 13 14:32:04.120703 kernel: rtc_cmos 00:00: registered as rtc0 Dec 13 14:32:04.120840 kernel: rtc_cmos 00:00: setting system clock to 2024-12-13T14:32:03 UTC (1734100323) Dec 13 14:32:04.120957 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Dec 13 14:32:04.120975 kernel: intel_pstate: CPU model not supported Dec 13 14:32:04.120992 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:32:04.121007 kernel: Segment Routing with IPv6 Dec 13 14:32:04.121027 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:32:04.121042 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:32:04.121058 kernel: Key type dns_resolver registered Dec 13 14:32:04.121073 kernel: IPI shorthand broadcast: enabled Dec 13 14:32:04.121086 kernel: sched_clock: Marking stable (388746544, 322384643)->(838317936, -127186749) Dec 13 14:32:04.121099 kernel: registered taskstats version 1 Dec 13 14:32:04.121112 kernel: Loading compiled-in X.509 certificates Dec 13 14:32:04.121125 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:32:04.121138 kernel: Key type .fscrypt registered Dec 13 14:32:04.121157 kernel: Key type fscrypt-provisioning registered Dec 13 14:32:04.121281 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:32:04.121298 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:32:04.121313 kernel: ima: No architecture policies found Dec 13 14:32:04.121328 kernel: clk: Disabling unused clocks Dec 13 14:32:04.121342 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:32:04.121359 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:32:04.121374 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:32:04.121391 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:32:04.121411 kernel: Run /init as init process Dec 13 14:32:04.121427 kernel: with arguments: Dec 13 14:32:04.121442 kernel: /init Dec 13 14:32:04.121458 kernel: with environment: Dec 13 14:32:04.121525 kernel: HOME=/ Dec 13 14:32:04.121540 kernel: TERM=linux Dec 13 14:32:04.121554 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:32:04.121571 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:32:04.121592 systemd[1]: Detected virtualization amazon. Dec 13 14:32:04.121609 systemd[1]: Detected architecture x86-64. Dec 13 14:32:04.121689 systemd[1]: Running in initrd. Dec 13 14:32:04.121717 systemd[1]: No hostname configured, using default hostname. Dec 13 14:32:04.121748 systemd[1]: Hostname set to . Dec 13 14:32:04.121766 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:32:04.121784 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:32:04.121797 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:32:04.121809 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:32:04.121822 systemd[1]: Reached target cryptsetup.target. Dec 13 14:32:04.121834 systemd[1]: Reached target paths.target. Dec 13 14:32:04.121847 systemd[1]: Reached target slices.target. Dec 13 14:32:04.121861 systemd[1]: Reached target swap.target. Dec 13 14:32:04.121874 systemd[1]: Reached target timers.target. Dec 13 14:32:04.121892 systemd[1]: Listening on iscsid.socket. Dec 13 14:32:04.121906 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:32:04.121920 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:32:04.121933 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:32:04.121947 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:32:04.121961 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:32:04.121974 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:32:04.121988 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:32:04.122004 systemd[1]: Reached target sockets.target. Dec 13 14:32:04.122018 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:32:04.122035 systemd[1]: Finished network-cleanup.service. Dec 13 14:32:04.122048 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:32:04.122062 systemd[1]: Starting systemd-journald.service... Dec 13 14:32:04.122076 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:32:04.122090 systemd[1]: Starting systemd-resolved.service... Dec 13 14:32:04.122103 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:32:04.122117 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:32:04.122139 systemd-journald[185]: Journal started Dec 13 14:32:04.122209 systemd-journald[185]: Runtime Journal (/run/log/journal/ec24b567a5285b5e3ee1a6d66e14bd57) is 4.8M, max 38.7M, 33.9M free. Dec 13 14:32:04.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:04.139737 kernel: audit: type=1130 audit(1734100324.129:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:04.135593 systemd-modules-load[186]: Inserted module 'overlay' Dec 13 14:32:04.146765 systemd[1]: Started systemd-journald.service. Dec 13 14:32:04.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:04.151528 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:32:04.367945 kernel: audit: type=1130 audit(1734100324.149:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:04.367992 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:32:04.368012 kernel: Bridge firewalling registered Dec 13 14:32:04.368038 kernel: SCSI subsystem initialized Dec 13 14:32:04.368059 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:32:04.368081 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:32:04.368099 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:32:04.212804 systemd-modules-load[186]: Inserted module 'br_netfilter' Dec 13 14:32:04.235297 systemd-resolved[187]: Positive Trust Anchors: Dec 13 14:32:04.377160 kernel: audit: type=1130 audit(1734100324.369:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:04.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:04.235308 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:32:04.235360 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:32:04.402552 kernel: audit: type=1130 audit(1734100324.382:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:04.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:04.247362 systemd-resolved[187]: Defaulting to hostname 'linux'. Dec 13 14:32:04.259684 systemd-modules-load[186]: Inserted module 'dm_multipath' Dec 13 14:32:04.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:04.377373 systemd[1]: Started systemd-resolved.service. Dec 13 14:32:04.402683 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:32:04.415534 kernel: audit: type=1130 audit(1734100324.407:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:04.409346 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:32:04.427897 kernel: audit: type=1130 audit(1734100324.413:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:04.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:04.427983 systemd[1]: Reached target nss-lookup.target. Dec 13 14:32:04.435430 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:32:04.438270 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:32:04.440207 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:32:04.460112 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:32:04.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:04.475723 kernel: audit: type=1130 audit(1734100324.460:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:04.492053 kernel: audit: type=1130 audit(1734100324.486:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:04.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:04.487605 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:32:04.493180 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:32:04.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:04.499837 kernel: audit: type=1130 audit(1734100324.493:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:04.495895 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:32:04.510791 dracut-cmdline[206]: dracut-dracut-053 Dec 13 14:32:04.513457 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:32:04.607046 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:32:04.631727 kernel: iscsi: registered transport (tcp) Dec 13 14:32:04.661736 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:32:04.661818 kernel: QLogic iSCSI HBA Driver Dec 13 14:32:04.707713 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:32:04.709041 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:32:04.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:04.793767 kernel: raid6: avx512x4 gen() 13977 MB/s Dec 13 14:32:04.793861 kernel: raid6: avx512x4 xor() 5918 MB/s Dec 13 14:32:04.805756 kernel: raid6: avx512x2 gen() 12748 MB/s Dec 13 14:32:04.822757 kernel: raid6: avx512x2 xor() 21132 MB/s Dec 13 14:32:04.840757 kernel: raid6: avx512x1 gen() 11485 MB/s Dec 13 14:32:04.857750 kernel: raid6: avx512x1 xor() 18060 MB/s Dec 13 14:32:04.874752 kernel: raid6: avx2x4 gen() 14957 MB/s Dec 13 14:32:04.891748 kernel: raid6: avx2x4 xor() 6390 MB/s Dec 13 14:32:04.909740 kernel: raid6: avx2x2 gen() 15118 MB/s Dec 13 14:32:04.926777 kernel: raid6: avx2x2 xor() 13179 MB/s Dec 13 14:32:04.946762 kernel: raid6: avx2x1 gen() 7825 MB/s Dec 13 14:32:04.965749 kernel: raid6: avx2x1 xor() 4522 MB/s Dec 13 14:32:04.984751 kernel: raid6: sse2x4 gen() 3944 MB/s Dec 13 14:32:05.001748 kernel: raid6: sse2x4 xor() 3854 MB/s Dec 13 14:32:05.020738 kernel: raid6: sse2x2 gen() 8531 MB/s Dec 13 14:32:05.038741 kernel: raid6: sse2x2 xor() 5004 MB/s Dec 13 14:32:05.055743 kernel: raid6: sse2x1 gen() 7382 MB/s Dec 13 14:32:05.076889 kernel: raid6: sse2x1 xor() 2633 MB/s Dec 13 14:32:05.076964 kernel: raid6: using algorithm avx2x2 gen() 15118 MB/s Dec 13 14:32:05.076981 kernel: raid6: .... xor() 13179 MB/s, rmw enabled Dec 13 14:32:05.079498 kernel: raid6: using avx512x2 recovery algorithm Dec 13 14:32:05.149824 kernel: xor: automatically using best checksumming function avx Dec 13 14:32:05.305724 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:32:05.331632 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:32:05.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:05.334000 audit: BPF prog-id=7 op=LOAD Dec 13 14:32:05.334000 audit: BPF prog-id=8 op=LOAD Dec 13 14:32:05.336762 systemd[1]: Starting systemd-udevd.service... Dec 13 14:32:05.383932 systemd-udevd[384]: Using default interface naming scheme 'v252'. Dec 13 14:32:05.391128 systemd[1]: Started systemd-udevd.service. Dec 13 14:32:05.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:05.394202 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:32:05.421220 dracut-pre-trigger[388]: rd.md=0: removing MD RAID activation Dec 13 14:32:05.466658 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:32:05.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:05.469276 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:32:05.543134 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:32:05.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:05.625716 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:32:05.650068 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:32:05.650136 kernel: AES CTR mode by8 optimization enabled Dec 13 14:32:05.669321 kernel: ena 0000:00:05.0: ENA device version: 0.10 Dec 13 14:32:05.681426 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Dec 13 14:32:05.681598 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Dec 13 14:32:05.683174 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:6f:30:ae:2d:7d Dec 13 14:32:05.704433 kernel: nvme nvme0: pci function 0000:00:04.0 Dec 13 14:32:05.704713 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Dec 13 14:32:05.706823 (udev-worker)[432]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:32:05.827016 kernel: nvme nvme0: 2/0/0 default/read/poll queues Dec 13 14:32:05.827245 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:32:05.827265 kernel: GPT:9289727 != 16777215 Dec 13 14:32:05.827284 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:32:05.827302 kernel: GPT:9289727 != 16777215 Dec 13 14:32:05.827319 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:32:05.827335 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:32:05.827350 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (437) Dec 13 14:32:05.874377 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:32:05.893900 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:32:05.916909 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:32:05.922889 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:32:05.923025 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:32:05.928103 systemd[1]: Starting disk-uuid.service... Dec 13 14:32:05.944716 disk-uuid[592]: Primary Header is updated. Dec 13 14:32:05.944716 disk-uuid[592]: Secondary Entries is updated. Dec 13 14:32:05.944716 disk-uuid[592]: Secondary Header is updated. Dec 13 14:32:05.955136 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:32:05.957989 kernel: GPT:disk_guids don't match. Dec 13 14:32:05.958046 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:32:05.958059 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:32:05.966712 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:32:06.970755 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:32:06.971527 disk-uuid[593]: The operation has completed successfully. Dec 13 14:32:07.135161 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:32:07.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.135713 systemd[1]: Finished disk-uuid.service. Dec 13 14:32:07.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.152576 systemd[1]: Starting verity-setup.service... Dec 13 14:32:07.176749 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 14:32:07.302069 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:32:07.305433 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:32:07.312630 systemd[1]: Finished verity-setup.service. Dec 13 14:32:07.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.415123 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:32:07.414896 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:32:07.416267 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:32:07.417420 systemd[1]: Starting ignition-setup.service... Dec 13 14:32:07.427632 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:32:07.461226 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:32:07.461302 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:32:07.461323 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:32:07.519774 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:32:07.542529 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:32:07.560860 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:32:07.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.561000 audit: BPF prog-id=9 op=LOAD Dec 13 14:32:07.564393 systemd[1]: Starting systemd-networkd.service... Dec 13 14:32:07.600665 systemd[1]: Finished ignition-setup.service. Dec 13 14:32:07.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.604409 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:32:07.612353 systemd-networkd[1102]: lo: Link UP Dec 13 14:32:07.612709 systemd-networkd[1102]: lo: Gained carrier Dec 13 14:32:07.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.613227 systemd-networkd[1102]: Enumeration completed Dec 13 14:32:07.614526 systemd[1]: Started systemd-networkd.service. Dec 13 14:32:07.616294 systemd-networkd[1102]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:32:07.617299 systemd[1]: Reached target network.target. Dec 13 14:32:07.623397 systemd[1]: Starting iscsiuio.service... Dec 13 14:32:07.624782 systemd-networkd[1102]: eth0: Link UP Dec 13 14:32:07.624789 systemd-networkd[1102]: eth0: Gained carrier Dec 13 14:32:07.639586 systemd[1]: Started iscsiuio.service. Dec 13 14:32:07.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.643416 systemd[1]: Starting iscsid.service... Dec 13 14:32:07.647823 systemd-networkd[1102]: eth0: DHCPv4 address 172.31.19.209/20, gateway 172.31.16.1 acquired from 172.31.16.1 Dec 13 14:32:07.650935 iscsid[1111]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:32:07.650935 iscsid[1111]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:32:07.650935 iscsid[1111]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:32:07.650935 iscsid[1111]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:32:07.650935 iscsid[1111]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:32:07.650935 iscsid[1111]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:32:07.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.652299 systemd[1]: Started iscsid.service. Dec 13 14:32:07.654810 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:32:07.674871 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:32:07.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.675258 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:32:07.678913 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:32:07.680037 systemd[1]: Reached target remote-fs.target. Dec 13 14:32:07.681717 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:32:07.700910 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:32:07.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:08.010985 ignition[1104]: Ignition 2.14.0 Dec 13 14:32:08.010999 ignition[1104]: Stage: fetch-offline Dec 13 14:32:08.011147 ignition[1104]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:32:08.011248 ignition[1104]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:32:08.033362 ignition[1104]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:32:08.034960 ignition[1104]: Ignition finished successfully Dec 13 14:32:08.036786 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:32:08.039173 systemd[1]: Starting ignition-fetch.service... Dec 13 14:32:08.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:08.059553 ignition[1130]: Ignition 2.14.0 Dec 13 14:32:08.059567 ignition[1130]: Stage: fetch Dec 13 14:32:08.059795 ignition[1130]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:32:08.059828 ignition[1130]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:32:08.069279 ignition[1130]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:32:08.070915 ignition[1130]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:32:08.080551 ignition[1130]: INFO : PUT result: OK Dec 13 14:32:08.089060 ignition[1130]: DEBUG : parsed url from cmdline: "" Dec 13 14:32:08.089060 ignition[1130]: INFO : no config URL provided Dec 13 14:32:08.089060 ignition[1130]: INFO : reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:32:08.089060 ignition[1130]: INFO : no config at "/usr/lib/ignition/user.ign" Dec 13 14:32:08.095043 ignition[1130]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:32:08.095043 ignition[1130]: INFO : PUT result: OK Dec 13 14:32:08.095043 ignition[1130]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Dec 13 14:32:08.098511 ignition[1130]: INFO : GET result: OK Dec 13 14:32:08.098511 ignition[1130]: DEBUG : parsing config with SHA512: 6cec3e57b8c093fe178ba0e9a069f98f66e4e5e36c9b30f0675e4f9cf53908d9e5796206d261d0fdd4a5a87f73d2b97c3ee7f9851958400f12d4a64fea639b3d Dec 13 14:32:08.101732 unknown[1130]: fetched base config from "system" Dec 13 14:32:08.101747 unknown[1130]: fetched base config from "system" Dec 13 14:32:08.101756 unknown[1130]: fetched user config from "aws" Dec 13 14:32:08.102931 ignition[1130]: fetch: fetch complete Dec 13 14:32:08.102938 ignition[1130]: fetch: fetch passed Dec 13 14:32:08.105454 systemd[1]: Finished ignition-fetch.service. Dec 13 14:32:08.102986 ignition[1130]: Ignition finished successfully Dec 13 14:32:08.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:08.109648 systemd[1]: Starting ignition-kargs.service... Dec 13 14:32:08.120512 ignition[1136]: Ignition 2.14.0 Dec 13 14:32:08.120523 ignition[1136]: Stage: kargs Dec 13 14:32:08.120674 ignition[1136]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:32:08.120715 ignition[1136]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:32:08.127415 ignition[1136]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:32:08.128664 ignition[1136]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:32:08.130532 ignition[1136]: INFO : PUT result: OK Dec 13 14:32:08.134636 ignition[1136]: kargs: kargs passed Dec 13 14:32:08.134713 ignition[1136]: Ignition finished successfully Dec 13 14:32:08.136838 systemd[1]: Finished ignition-kargs.service. Dec 13 14:32:08.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:08.139390 systemd[1]: Starting ignition-disks.service... Dec 13 14:32:08.150710 ignition[1142]: Ignition 2.14.0 Dec 13 14:32:08.150724 ignition[1142]: Stage: disks Dec 13 14:32:08.150932 ignition[1142]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:32:08.150968 ignition[1142]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:32:08.161975 ignition[1142]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:32:08.163357 ignition[1142]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:32:08.165740 ignition[1142]: INFO : PUT result: OK Dec 13 14:32:08.169840 ignition[1142]: disks: disks passed Dec 13 14:32:08.169971 ignition[1142]: Ignition finished successfully Dec 13 14:32:08.173077 systemd[1]: Finished ignition-disks.service. Dec 13 14:32:08.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:08.176238 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:32:08.178122 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:32:08.179750 systemd[1]: Reached target local-fs.target. Dec 13 14:32:08.181366 systemd[1]: Reached target sysinit.target. Dec 13 14:32:08.184249 systemd[1]: Reached target basic.target. Dec 13 14:32:08.186911 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:32:08.227048 systemd-fsck[1150]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 14:32:08.231382 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:32:08.238138 kernel: kauditd_printk_skb: 22 callbacks suppressed Dec 13 14:32:08.238165 kernel: audit: type=1130 audit(1734100328.231:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:08.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:08.233528 systemd[1]: Mounting sysroot.mount... Dec 13 14:32:08.249714 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:32:08.251039 systemd[1]: Mounted sysroot.mount. Dec 13 14:32:08.252707 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:32:08.257141 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:32:08.259561 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:32:08.259648 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:32:08.261268 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:32:08.272467 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:32:08.273880 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:32:08.282431 initrd-setup-root[1171]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:32:08.335088 initrd-setup-root[1179]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:32:08.353742 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:32:08.366986 initrd-setup-root[1188]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:32:08.377098 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1185) Dec 13 14:32:08.377160 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:32:08.378239 initrd-setup-root[1196]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:32:08.381495 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:32:08.381519 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:32:08.390721 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:32:08.394057 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:32:08.613556 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:32:08.618729 kernel: audit: type=1130 audit(1734100328.612:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:08.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:08.614820 systemd[1]: Starting ignition-mount.service... Dec 13 14:32:08.625367 systemd[1]: Starting sysroot-boot.service... Dec 13 14:32:08.635173 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:32:08.635310 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:32:08.664337 systemd[1]: Finished sysroot-boot.service. Dec 13 14:32:08.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:08.669760 kernel: audit: type=1130 audit(1734100328.662:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:08.682243 ignition[1235]: INFO : Ignition 2.14.0 Dec 13 14:32:08.682243 ignition[1235]: INFO : Stage: mount Dec 13 14:32:08.684661 ignition[1235]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:32:08.684661 ignition[1235]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:32:08.700703 ignition[1235]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:32:08.702874 ignition[1235]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:32:08.705198 ignition[1235]: INFO : PUT result: OK Dec 13 14:32:08.712186 ignition[1235]: INFO : mount: mount passed Dec 13 14:32:08.712186 ignition[1235]: INFO : Ignition finished successfully Dec 13 14:32:08.714947 systemd[1]: Finished ignition-mount.service. Dec 13 14:32:08.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:08.717161 systemd[1]: Starting ignition-files.service... Dec 13 14:32:08.723877 kernel: audit: type=1130 audit(1734100328.713:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:08.728059 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:32:08.749010 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1242) Dec 13 14:32:08.749076 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:32:08.749095 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:32:08.754467 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:32:08.769731 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:32:08.788395 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:32:08.807850 ignition[1261]: INFO : Ignition 2.14.0 Dec 13 14:32:08.807850 ignition[1261]: INFO : Stage: files Dec 13 14:32:08.811151 ignition[1261]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:32:08.811151 ignition[1261]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:32:08.820228 ignition[1261]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:32:08.821918 ignition[1261]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:32:08.828722 ignition[1261]: INFO : PUT result: OK Dec 13 14:32:08.839918 ignition[1261]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:32:08.848180 ignition[1261]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:32:08.848180 ignition[1261]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:32:08.857552 ignition[1261]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:32:08.860136 ignition[1261]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:32:08.863162 unknown[1261]: wrote ssh authorized keys file for user: core Dec 13 14:32:08.868157 ignition[1261]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:32:08.909447 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:32:08.913150 ignition[1261]: INFO : GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 14:32:09.568190 ignition[1261]: INFO : GET result: OK Dec 13 14:32:09.600828 systemd-networkd[1102]: eth0: Gained IPv6LL Dec 13 14:32:09.956421 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:32:09.956421 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Dec 13 14:32:09.962173 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:32:09.979571 ignition[1261]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3283886794" Dec 13 14:32:09.982704 ignition[1261]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3283886794": device or resource busy Dec 13 14:32:09.982704 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3283886794", trying btrfs: device or resource busy Dec 13 14:32:09.993838 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1261) Dec 13 14:32:09.993867 ignition[1261]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3283886794" Dec 13 14:32:09.993867 ignition[1261]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3283886794" Dec 13 14:32:10.003287 ignition[1261]: INFO : op(3): [started] unmounting "/mnt/oem3283886794" Dec 13 14:32:10.005168 ignition[1261]: INFO : op(3): [finished] unmounting "/mnt/oem3283886794" Dec 13 14:32:10.006769 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Dec 13 14:32:10.006769 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:32:10.006769 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:32:10.017864 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:32:10.017864 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:32:10.017864 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:32:10.017864 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:32:10.017864 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:32:10.017864 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:32:10.017864 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:32:10.007701 systemd[1]: mnt-oem3283886794.mount: Deactivated successfully. Dec 13 14:32:10.042033 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:32:10.042033 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:32:10.042033 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:32:10.042033 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Dec 13 14:32:10.042033 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:32:10.060222 ignition[1261]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem631176562" Dec 13 14:32:10.060222 ignition[1261]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem631176562": device or resource busy Dec 13 14:32:10.060222 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem631176562", trying btrfs: device or resource busy Dec 13 14:32:10.060222 ignition[1261]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem631176562" Dec 13 14:32:10.075594 ignition[1261]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem631176562" Dec 13 14:32:10.082713 ignition[1261]: INFO : op(6): [started] unmounting "/mnt/oem631176562" Dec 13 14:32:10.082713 ignition[1261]: INFO : op(6): [finished] unmounting "/mnt/oem631176562" Dec 13 14:32:10.082713 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Dec 13 14:32:10.082713 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Dec 13 14:32:10.082713 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:32:10.080473 systemd[1]: mnt-oem631176562.mount: Deactivated successfully. Dec 13 14:32:10.123706 ignition[1261]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem160634539" Dec 13 14:32:10.125349 ignition[1261]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem160634539": device or resource busy Dec 13 14:32:10.125349 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem160634539", trying btrfs: device or resource busy Dec 13 14:32:10.125349 ignition[1261]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem160634539" Dec 13 14:32:10.134532 ignition[1261]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem160634539" Dec 13 14:32:10.134532 ignition[1261]: INFO : op(9): [started] unmounting "/mnt/oem160634539" Dec 13 14:32:10.137491 ignition[1261]: INFO : op(9): [finished] unmounting "/mnt/oem160634539" Dec 13 14:32:10.137491 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Dec 13 14:32:10.142760 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:32:10.147925 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:32:10.168739 ignition[1261]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2797103875" Dec 13 14:32:10.171414 ignition[1261]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2797103875": device or resource busy Dec 13 14:32:10.171414 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2797103875", trying btrfs: device or resource busy Dec 13 14:32:10.171414 ignition[1261]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2797103875" Dec 13 14:32:10.171414 ignition[1261]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2797103875" Dec 13 14:32:10.180350 ignition[1261]: INFO : op(c): [started] unmounting "/mnt/oem2797103875" Dec 13 14:32:10.180350 ignition[1261]: INFO : op(c): [finished] unmounting "/mnt/oem2797103875" Dec 13 14:32:10.180350 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:32:10.180350 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:32:10.180350 ignition[1261]: INFO : GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Dec 13 14:32:10.617203 ignition[1261]: INFO : GET result: OK Dec 13 14:32:10.993171 systemd[1]: mnt-oem160634539.mount: Deactivated successfully. Dec 13 14:32:11.253822 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:32:11.253822 ignition[1261]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:32:11.253822 ignition[1261]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:32:11.253822 ignition[1261]: INFO : files: op(10): [started] processing unit "amazon-ssm-agent.service" Dec 13 14:32:11.276945 ignition[1261]: INFO : files: op(10): op(11): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Dec 13 14:32:11.276945 ignition[1261]: INFO : files: op(10): op(11): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Dec 13 14:32:11.276945 ignition[1261]: INFO : files: op(10): [finished] processing unit "amazon-ssm-agent.service" Dec 13 14:32:11.276945 ignition[1261]: INFO : files: op(12): [started] processing unit "nvidia.service" Dec 13 14:32:11.276945 ignition[1261]: INFO : files: op(12): [finished] processing unit "nvidia.service" Dec 13 14:32:11.276945 ignition[1261]: INFO : files: op(13): [started] processing unit "prepare-helm.service" Dec 13 14:32:11.276945 ignition[1261]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:32:11.276945 ignition[1261]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:32:11.276945 ignition[1261]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" Dec 13 14:32:11.276945 ignition[1261]: INFO : files: op(15): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:32:11.276945 ignition[1261]: INFO : files: op(15): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:32:11.276945 ignition[1261]: INFO : files: op(16): [started] setting preset to enabled for "amazon-ssm-agent.service" Dec 13 14:32:11.276945 ignition[1261]: INFO : files: op(16): [finished] setting preset to enabled for "amazon-ssm-agent.service" Dec 13 14:32:11.276945 ignition[1261]: INFO : files: op(17): [started] setting preset to enabled for "nvidia.service" Dec 13 14:32:11.276945 ignition[1261]: INFO : files: op(17): [finished] setting preset to enabled for "nvidia.service" Dec 13 14:32:11.276945 ignition[1261]: INFO : files: op(18): [started] setting preset to enabled for "prepare-helm.service" Dec 13 14:32:11.276945 ignition[1261]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 14:32:11.338346 ignition[1261]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:32:11.340789 ignition[1261]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:32:11.340789 ignition[1261]: INFO : files: files passed Dec 13 14:32:11.340789 ignition[1261]: INFO : Ignition finished successfully Dec 13 14:32:11.340998 systemd[1]: Finished ignition-files.service. Dec 13 14:32:11.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.353726 kernel: audit: type=1130 audit(1734100331.348:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.359108 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:32:11.360814 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:32:11.362278 systemd[1]: Starting ignition-quench.service... Dec 13 14:32:11.378889 kernel: audit: type=1130 audit(1734100331.368:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.378924 kernel: audit: type=1131 audit(1734100331.368:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.368134 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:32:11.368257 systemd[1]: Finished ignition-quench.service. Dec 13 14:32:11.390902 initrd-setup-root-after-ignition[1286]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:32:11.401462 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:32:11.402295 systemd[1]: Reached target ignition-complete.target. Dec 13 14:32:11.413184 kernel: audit: type=1130 audit(1734100331.400:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.413510 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:32:11.437296 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:32:11.437402 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:32:11.449820 kernel: audit: type=1130 audit(1734100331.437:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.449862 kernel: audit: type=1131 audit(1734100331.437:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.439016 systemd[1]: Reached target initrd-fs.target. Dec 13 14:32:11.440897 systemd[1]: Reached target initrd.target. Dec 13 14:32:11.449947 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:32:11.451674 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:32:11.475584 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:32:11.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.479739 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:32:11.499455 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:32:11.501828 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:32:11.508502 systemd[1]: Stopped target timers.target. Dec 13 14:32:11.510905 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:32:11.512097 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:32:11.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.514107 systemd[1]: Stopped target initrd.target. Dec 13 14:32:11.518280 systemd[1]: Stopped target basic.target. Dec 13 14:32:11.521002 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:32:11.522968 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:32:11.524765 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:32:11.525779 systemd[1]: Stopped target remote-fs.target. Dec 13 14:32:11.528830 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:32:11.530602 systemd[1]: Stopped target sysinit.target. Dec 13 14:32:11.534854 systemd[1]: Stopped target local-fs.target. Dec 13 14:32:11.536384 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:32:11.538185 systemd[1]: Stopped target swap.target. Dec 13 14:32:11.539738 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:32:11.541040 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:32:11.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.543493 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:32:11.545452 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:32:11.546612 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:32:11.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.549005 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:32:11.549118 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:32:11.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.551448 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:32:11.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.551554 systemd[1]: Stopped ignition-files.service. Dec 13 14:32:11.553945 systemd[1]: Stopping ignition-mount.service... Dec 13 14:32:11.558536 systemd[1]: Stopping iscsiuio.service... Dec 13 14:32:11.559280 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:32:11.559543 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:32:11.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.567342 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:32:11.575357 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:32:11.580393 ignition[1299]: INFO : Ignition 2.14.0 Dec 13 14:32:11.580393 ignition[1299]: INFO : Stage: umount Dec 13 14:32:11.580393 ignition[1299]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:32:11.580393 ignition[1299]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:32:11.575630 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:32:11.600624 ignition[1299]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:32:11.600624 ignition[1299]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:32:11.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.603053 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:32:11.615337 ignition[1299]: INFO : PUT result: OK Dec 13 14:32:11.603216 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:32:11.607799 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:32:11.607941 systemd[1]: Stopped iscsiuio.service. Dec 13 14:32:11.611684 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:32:11.621421 ignition[1299]: INFO : umount: umount passed Dec 13 14:32:11.621421 ignition[1299]: INFO : Ignition finished successfully Dec 13 14:32:11.611802 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:32:11.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.626146 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:32:11.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.626273 systemd[1]: Stopped ignition-mount.service. Dec 13 14:32:11.632429 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:32:11.632501 systemd[1]: Stopped ignition-disks.service. Dec 13 14:32:11.637896 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:32:11.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.637959 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:32:11.643477 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:32:11.643554 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:32:11.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.645964 systemd[1]: Stopped target network.target. Dec 13 14:32:11.648164 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:32:11.648252 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:32:11.652514 systemd[1]: Stopped target paths.target. Dec 13 14:32:11.656906 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:32:11.659460 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:32:11.661531 systemd[1]: Stopped target slices.target. Dec 13 14:32:11.665469 systemd[1]: Stopped target sockets.target. Dec 13 14:32:11.667852 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:32:11.667903 systemd[1]: Closed iscsid.socket. Dec 13 14:32:11.671057 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:32:11.671272 systemd[1]: Closed iscsiuio.socket. Dec 13 14:32:11.674752 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:32:11.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.675487 systemd[1]: Stopped ignition-setup.service. Dec 13 14:32:11.678667 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:32:11.680678 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:32:11.681755 systemd-networkd[1102]: eth0: DHCPv6 lease lost Dec 13 14:32:11.685479 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:32:11.686522 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:32:11.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.686648 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:32:11.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.693000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:32:11.693000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:32:11.691233 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:32:11.691445 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:32:11.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.694177 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:32:11.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.694225 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:32:11.698975 systemd[1]: Stopping network-cleanup.service... Dec 13 14:32:11.700069 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:32:11.700145 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:32:11.701264 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:32:11.701308 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:32:11.703934 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:32:11.704062 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:32:11.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.710082 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:32:11.721860 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:32:11.723048 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:32:11.723323 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:32:11.733444 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:32:11.733503 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:32:11.737417 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:32:11.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.738782 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:32:11.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.739867 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:32:11.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.740006 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:32:11.744029 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:32:11.744120 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:32:11.746391 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:32:11.746466 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:32:11.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.752978 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:32:11.754892 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:32:11.754971 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:32:11.757428 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:32:11.758005 systemd[1]: Stopped network-cleanup.service. Dec 13 14:32:11.767674 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:32:11.767816 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:32:11.806547 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:32:11.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.806682 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:32:11.808643 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:32:11.810742 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:32:11.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.810807 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:32:11.813908 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:32:11.828832 systemd[1]: Switching root. Dec 13 14:32:11.868400 iscsid[1111]: iscsid shutting down. Dec 13 14:32:11.870902 systemd-journald[185]: Received SIGTERM from PID 1 (n/a). Dec 13 14:32:11.870992 systemd-journald[185]: Journal stopped Dec 13 14:32:17.991111 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:32:17.991226 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:32:17.991252 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:32:17.991271 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:32:17.991288 kernel: SELinux: policy capability open_perms=1 Dec 13 14:32:17.991305 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:32:17.991324 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:32:17.991342 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:32:17.991360 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:32:17.991377 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:32:17.991397 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:32:17.991427 systemd[1]: Successfully loaded SELinux policy in 59.709ms. Dec 13 14:32:17.991464 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.169ms. Dec 13 14:32:17.991485 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:32:17.991504 systemd[1]: Detected virtualization amazon. Dec 13 14:32:17.991521 systemd[1]: Detected architecture x86-64. Dec 13 14:32:17.991539 systemd[1]: Detected first boot. Dec 13 14:32:17.991558 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:32:17.991576 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:32:17.991601 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:32:17.991620 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:32:17.991646 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:32:17.991668 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:32:17.991687 kernel: kauditd_printk_skb: 51 callbacks suppressed Dec 13 14:32:17.991733 kernel: audit: type=1334 audit(1734100337.553:87): prog-id=12 op=LOAD Dec 13 14:32:17.991751 kernel: audit: type=1334 audit(1734100337.553:88): prog-id=3 op=UNLOAD Dec 13 14:32:17.991771 kernel: audit: type=1334 audit(1734100337.554:89): prog-id=13 op=LOAD Dec 13 14:32:17.991789 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:32:17.991807 kernel: audit: type=1334 audit(1734100337.556:90): prog-id=14 op=LOAD Dec 13 14:32:17.991825 kernel: audit: type=1334 audit(1734100337.556:91): prog-id=4 op=UNLOAD Dec 13 14:32:17.991842 kernel: audit: type=1334 audit(1734100337.556:92): prog-id=5 op=UNLOAD Dec 13 14:32:17.991860 kernel: audit: type=1131 audit(1734100337.558:93): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.991878 systemd[1]: Stopped iscsid.service. Dec 13 14:32:17.991901 kernel: audit: type=1334 audit(1734100337.569:94): prog-id=12 op=UNLOAD Dec 13 14:32:17.991919 kernel: audit: type=1131 audit(1734100337.571:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.991940 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:32:17.991960 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:32:17.991981 kernel: audit: type=1130 audit(1734100337.580:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.992002 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:32:17.992023 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:32:17.992045 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:32:17.992071 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 14:32:17.992094 systemd[1]: Created slice system-getty.slice. Dec 13 14:32:17.992116 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:32:17.992135 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:32:17.992156 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:32:17.992177 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:32:17.992198 systemd[1]: Created slice user.slice. Dec 13 14:32:17.992221 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:32:17.992242 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:32:17.992263 systemd[1]: Set up automount boot.automount. Dec 13 14:32:17.992284 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:32:17.992306 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:32:17.992322 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:32:17.992345 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:32:17.992362 systemd[1]: Reached target integritysetup.target. Dec 13 14:32:17.992382 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:32:17.992402 systemd[1]: Reached target remote-fs.target. Dec 13 14:32:17.992425 systemd[1]: Reached target slices.target. Dec 13 14:32:17.992446 systemd[1]: Reached target swap.target. Dec 13 14:32:17.992463 systemd[1]: Reached target torcx.target. Dec 13 14:32:17.992482 systemd[1]: Reached target veritysetup.target. Dec 13 14:32:17.992502 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:32:17.992518 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:32:17.992536 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:32:17.992557 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:32:17.992575 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:32:17.992596 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:32:17.992614 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:32:17.992631 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:32:17.992650 systemd[1]: Mounting media.mount... Dec 13 14:32:17.992670 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:17.992687 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:32:17.992720 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:32:17.992738 systemd[1]: Mounting tmp.mount... Dec 13 14:32:17.992757 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:32:17.992785 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:32:17.992802 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:32:17.992820 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:32:17.992838 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:32:17.993320 systemd[1]: Starting modprobe@drm.service... Dec 13 14:32:17.993353 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:32:17.993376 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:32:17.993398 systemd[1]: Starting modprobe@loop.service... Dec 13 14:32:17.993419 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:32:17.993445 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:32:17.993480 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:32:17.993741 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:32:17.993766 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:32:17.993788 systemd[1]: Stopped systemd-journald.service. Dec 13 14:32:17.993812 systemd[1]: Starting systemd-journald.service... Dec 13 14:32:17.993833 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:32:17.993854 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:32:17.995683 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:32:17.995730 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:32:17.995750 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:32:17.995769 systemd[1]: Stopped verity-setup.service. Dec 13 14:32:17.995789 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:18.005217 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:32:18.005274 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:32:18.005294 systemd[1]: Mounted media.mount. Dec 13 14:32:18.005314 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:32:18.005351 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:32:18.005483 systemd[1]: Mounted tmp.mount. Dec 13 14:32:18.005505 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:32:18.005523 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:32:18.005541 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:32:18.006256 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:32:18.006287 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:32:18.006307 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:32:18.006326 systemd[1]: Finished modprobe@drm.service. Dec 13 14:32:18.006344 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:32:18.006363 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:32:18.006385 kernel: loop: module loaded Dec 13 14:32:18.006405 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:32:18.006424 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:32:18.006442 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:32:18.006460 kernel: fuse: init (API version 7.34) Dec 13 14:32:18.006478 systemd[1]: Reached target network-pre.target. Dec 13 14:32:18.006498 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:32:18.006516 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:32:18.006533 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:32:18.006552 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:32:18.006571 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:32:18.006591 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:32:18.006613 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:32:18.006633 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:32:18.006662 systemd-journald[1409]: Journal started Dec 13 14:32:18.008788 systemd-journald[1409]: Runtime Journal (/run/log/journal/ec24b567a5285b5e3ee1a6d66e14bd57) is 4.8M, max 38.7M, 33.9M free. Dec 13 14:32:18.008865 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:32:12.306000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:32:12.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:32:12.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:32:12.394000 audit: BPF prog-id=10 op=LOAD Dec 13 14:32:12.394000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:32:12.394000 audit: BPF prog-id=11 op=LOAD Dec 13 14:32:12.394000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:32:12.655000 audit[1333]: AVC avc: denied { associate } for pid=1333 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:32:12.655000 audit[1333]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=1316 pid=1333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:12.655000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:32:12.657000 audit[1333]: AVC avc: denied { associate } for pid=1333 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:32:12.657000 audit[1333]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=1316 pid=1333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:12.657000 audit: CWD cwd="/" Dec 13 14:32:12.657000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:18.011760 systemd[1]: Finished modprobe@loop.service. Dec 13 14:32:12.657000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:12.657000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:32:17.553000 audit: BPF prog-id=12 op=LOAD Dec 13 14:32:17.553000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:32:17.554000 audit: BPF prog-id=13 op=LOAD Dec 13 14:32:17.556000 audit: BPF prog-id=14 op=LOAD Dec 13 14:32:17.556000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:32:17.556000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:32:17.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.569000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:32:17.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.843000 audit: BPF prog-id=15 op=LOAD Dec 13 14:32:17.843000 audit: BPF prog-id=16 op=LOAD Dec 13 14:32:17.843000 audit: BPF prog-id=17 op=LOAD Dec 13 14:32:17.843000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:32:17.843000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:32:17.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.930000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:18.015716 systemd[1]: Started systemd-journald.service. Dec 13 14:32:17.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.972000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:32:17.972000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffdb3afa880 a2=4000 a3=7ffdb3afa91c items=0 ppid=1 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:17.972000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:32:18.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:18.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:18.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:18.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:18.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.552556 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:32:12.654687 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-12-13T14:32:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:32:17.559783 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:32:12.655336 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-12-13T14:32:12Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:32:18.015368 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:32:12.655356 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-12-13T14:32:12Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:32:18.018164 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:32:12.655389 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-12-13T14:32:12Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:32:18.027381 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:32:12.655399 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-12-13T14:32:12Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:32:18.028419 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:32:12.655431 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-12-13T14:32:12Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:32:18.030072 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:32:12.655444 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-12-13T14:32:12Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:32:12.655634 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-12-13T14:32:12Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:32:12.655765 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-12-13T14:32:12Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:32:12.655782 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-12-13T14:32:12Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:32:12.656447 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-12-13T14:32:12Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:32:12.656482 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-12-13T14:32:12Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:32:12.656501 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-12-13T14:32:12Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:32:12.656515 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-12-13T14:32:12Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:32:12.656532 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-12-13T14:32:12Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:32:12.656545 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-12-13T14:32:12Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:32:16.854253 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-12-13T14:32:16Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:32:16.854526 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-12-13T14:32:16Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:32:16.854636 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-12-13T14:32:16Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:32:16.854853 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-12-13T14:32:16Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:32:16.854903 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-12-13T14:32:16Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:32:16.854961 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-12-13T14:32:16Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:32:18.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:18.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:18.042199 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:32:18.045758 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:32:18.046937 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:32:18.056293 systemd-journald[1409]: Time spent on flushing to /var/log/journal/ec24b567a5285b5e3ee1a6d66e14bd57 is 78.026ms for 1191 entries. Dec 13 14:32:18.056293 systemd-journald[1409]: System Journal (/var/log/journal/ec24b567a5285b5e3ee1a6d66e14bd57) is 8.0M, max 195.6M, 187.6M free. Dec 13 14:32:18.157930 systemd-journald[1409]: Received client request to flush runtime journal. Dec 13 14:32:18.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:18.136009 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:32:18.138927 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:32:18.160627 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:32:18.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:18.176094 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:32:18.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:18.179273 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:32:18.191512 udevadm[1449]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 14:32:18.281075 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:32:18.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:19.094560 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:32:19.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:19.097000 audit: BPF prog-id=18 op=LOAD Dec 13 14:32:19.097000 audit: BPF prog-id=19 op=LOAD Dec 13 14:32:19.097000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:32:19.097000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:32:19.099745 systemd[1]: Starting systemd-udevd.service... Dec 13 14:32:19.133146 systemd-udevd[1450]: Using default interface naming scheme 'v252'. Dec 13 14:32:19.168802 systemd[1]: Started systemd-udevd.service. Dec 13 14:32:19.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:19.169000 audit: BPF prog-id=20 op=LOAD Dec 13 14:32:19.172645 systemd[1]: Starting systemd-networkd.service... Dec 13 14:32:19.181000 audit: BPF prog-id=21 op=LOAD Dec 13 14:32:19.182000 audit: BPF prog-id=22 op=LOAD Dec 13 14:32:19.182000 audit: BPF prog-id=23 op=LOAD Dec 13 14:32:19.185175 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:32:19.240299 systemd[1]: Started systemd-userdbd.service. Dec 13 14:32:19.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:19.272996 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:32:19.275945 (udev-worker)[1454]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:32:19.363986 systemd-networkd[1456]: lo: Link UP Dec 13 14:32:19.364002 systemd-networkd[1456]: lo: Gained carrier Dec 13 14:32:19.364902 systemd-networkd[1456]: Enumeration completed Dec 13 14:32:19.365032 systemd[1]: Started systemd-networkd.service. Dec 13 14:32:19.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:19.368023 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:32:19.370890 systemd-networkd[1456]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:32:19.375734 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:32:19.376117 systemd-networkd[1456]: eth0: Link UP Dec 13 14:32:19.376567 systemd-networkd[1456]: eth0: Gained carrier Dec 13 14:32:19.388884 systemd-networkd[1456]: eth0: DHCPv4 address 172.31.19.209/20, gateway 172.31.16.1 acquired from 172.31.16.1 Dec 13 14:32:19.398744 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Dec 13 14:32:19.403679 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:32:19.403816 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input4 Dec 13 14:32:19.416721 kernel: ACPI: button: Sleep Button [SLPF] Dec 13 14:32:19.429000 audit[1466]: AVC avc: denied { confidentiality } for pid=1466 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:32:19.429000 audit[1466]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5646b7fd4410 a1=337fc a2=7f975d241bc5 a3=5 items=110 ppid=1450 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:19.429000 audit: CWD cwd="/" Dec 13 14:32:19.429000 audit: PATH item=0 name=(null) inode=1056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=1 name=(null) inode=14721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=2 name=(null) inode=14721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=3 name=(null) inode=14722 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=4 name=(null) inode=14721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=5 name=(null) inode=14723 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=6 name=(null) inode=14721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=7 name=(null) inode=14724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=8 name=(null) inode=14724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=9 name=(null) inode=14725 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=10 name=(null) inode=14724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=11 name=(null) inode=14726 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=12 name=(null) inode=14724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=13 name=(null) inode=14727 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=14 name=(null) inode=14724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=15 name=(null) inode=14728 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=16 name=(null) inode=14724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=17 name=(null) inode=14729 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=18 name=(null) inode=14721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=19 name=(null) inode=14730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=20 name=(null) inode=14730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=21 name=(null) inode=14731 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=22 name=(null) inode=14730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=23 name=(null) inode=14732 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=24 name=(null) inode=14730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=25 name=(null) inode=14733 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=26 name=(null) inode=14730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=27 name=(null) inode=14734 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=28 name=(null) inode=14730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=29 name=(null) inode=14735 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=30 name=(null) inode=14721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=31 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=32 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=33 name=(null) inode=14737 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=34 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=35 name=(null) inode=14738 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=36 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=37 name=(null) inode=14739 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=38 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=39 name=(null) inode=14740 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=40 name=(null) inode=14736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=41 name=(null) inode=14741 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=42 name=(null) inode=14721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=43 name=(null) inode=14742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=44 name=(null) inode=14742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=45 name=(null) inode=14743 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=46 name=(null) inode=14742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=47 name=(null) inode=14744 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=48 name=(null) inode=14742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=49 name=(null) inode=14745 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=50 name=(null) inode=14742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=51 name=(null) inode=14746 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=52 name=(null) inode=14742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=53 name=(null) inode=14747 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=54 name=(null) inode=1056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=55 name=(null) inode=14748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=56 name=(null) inode=14748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=57 name=(null) inode=14749 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=58 name=(null) inode=14748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=59 name=(null) inode=14750 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=60 name=(null) inode=14748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=61 name=(null) inode=14751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=62 name=(null) inode=14751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=63 name=(null) inode=14752 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=64 name=(null) inode=14751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=65 name=(null) inode=14753 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=66 name=(null) inode=14751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=67 name=(null) inode=14754 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=68 name=(null) inode=14751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=69 name=(null) inode=14755 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=70 name=(null) inode=14751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=71 name=(null) inode=14756 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=72 name=(null) inode=14748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=73 name=(null) inode=14757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=74 name=(null) inode=14757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=75 name=(null) inode=14758 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=76 name=(null) inode=14757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=77 name=(null) inode=14759 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=78 name=(null) inode=14757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=79 name=(null) inode=14760 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=80 name=(null) inode=14757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=81 name=(null) inode=14761 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=82 name=(null) inode=14757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=83 name=(null) inode=14762 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=84 name=(null) inode=14748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=85 name=(null) inode=14763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=86 name=(null) inode=14763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=87 name=(null) inode=14764 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=88 name=(null) inode=14763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=89 name=(null) inode=14765 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=90 name=(null) inode=14763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=91 name=(null) inode=14766 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=92 name=(null) inode=14763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=93 name=(null) inode=14767 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=94 name=(null) inode=14763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=95 name=(null) inode=14768 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=96 name=(null) inode=14748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=97 name=(null) inode=14769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=98 name=(null) inode=14769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=99 name=(null) inode=14770 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=100 name=(null) inode=14769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=101 name=(null) inode=14771 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=102 name=(null) inode=14769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=103 name=(null) inode=14772 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=104 name=(null) inode=14769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=105 name=(null) inode=14773 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=106 name=(null) inode=14769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=107 name=(null) inode=14774 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PATH item=109 name=(null) inode=14775 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:19.429000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:32:19.460707 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Dec 13 14:32:19.510187 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input5 Dec 13 14:32:19.517862 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:32:19.543725 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1453) Dec 13 14:32:19.700889 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:32:19.801170 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:32:19.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:19.803495 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:32:19.878833 lvm[1564]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:32:19.922094 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:32:19.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:19.923585 systemd[1]: Reached target cryptsetup.target. Dec 13 14:32:19.926202 systemd[1]: Starting lvm2-activation.service... Dec 13 14:32:19.952059 lvm[1565]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:32:19.999820 systemd[1]: Finished lvm2-activation.service. Dec 13 14:32:19.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:20.001191 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:32:20.006890 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:32:20.006927 systemd[1]: Reached target local-fs.target. Dec 13 14:32:20.010241 systemd[1]: Reached target machines.target. Dec 13 14:32:20.012857 systemd[1]: Starting ldconfig.service... Dec 13 14:32:20.014439 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:32:20.014493 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:32:20.015681 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:32:20.017628 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:32:20.019828 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:32:20.022020 systemd[1]: Starting systemd-sysext.service... Dec 13 14:32:20.031987 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1567 (bootctl) Dec 13 14:32:20.034153 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:32:20.056042 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:32:20.065356 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:32:20.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:20.065987 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:32:20.066197 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:32:20.080724 kernel: loop0: detected capacity change from 0 to 210664 Dec 13 14:32:20.268403 systemd-fsck[1576]: fsck.fat 4.2 (2021-01-31) Dec 13 14:32:20.268403 systemd-fsck[1576]: /dev/nvme0n1p1: 789 files, 119291/258078 clusters Dec 13 14:32:20.271283 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:32:20.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:20.274232 systemd[1]: Mounting boot.mount... Dec 13 14:32:20.287462 systemd[1]: Mounted boot.mount. Dec 13 14:32:20.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:20.311993 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:32:20.428716 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:32:20.493085 kernel: loop1: detected capacity change from 0 to 210664 Dec 13 14:32:20.509811 (sd-sysext)[1592]: Using extensions 'kubernetes'. Dec 13 14:32:20.510349 (sd-sysext)[1592]: Merged extensions into '/usr'. Dec 13 14:32:20.536144 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:20.538064 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:32:20.539367 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:32:20.542153 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:32:20.546117 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:32:20.552711 systemd[1]: Starting modprobe@loop.service... Dec 13 14:32:20.554740 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:32:20.554951 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:32:20.555130 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:20.559446 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:32:20.561622 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:32:20.561833 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:32:20.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:20.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:20.563505 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:32:20.564145 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:32:20.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:20.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:20.566151 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:32:20.566417 systemd[1]: Finished modprobe@loop.service. Dec 13 14:32:20.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:20.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:20.568234 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:32:20.568420 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:32:20.569996 systemd[1]: Finished systemd-sysext.service. Dec 13 14:32:20.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:20.573075 systemd[1]: Starting ensure-sysext.service... Dec 13 14:32:20.575795 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:32:20.589703 systemd[1]: Reloading. Dec 13 14:32:20.621996 systemd-tmpfiles[1599]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:32:20.631157 systemd-tmpfiles[1599]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:32:20.665566 systemd-tmpfiles[1599]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:32:20.739555 /usr/lib/systemd/system-generators/torcx-generator[1619]: time="2024-12-13T14:32:20Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:32:20.739597 /usr/lib/systemd/system-generators/torcx-generator[1619]: time="2024-12-13T14:32:20Z" level=info msg="torcx already run" Dec 13 14:32:20.988112 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:32:20.988136 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:32:21.011741 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:32:21.116000 audit: BPF prog-id=24 op=LOAD Dec 13 14:32:21.116000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:32:21.116000 audit: BPF prog-id=25 op=LOAD Dec 13 14:32:21.116000 audit: BPF prog-id=26 op=LOAD Dec 13 14:32:21.116000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:32:21.116000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:32:21.116000 audit: BPF prog-id=27 op=LOAD Dec 13 14:32:21.116000 audit: BPF prog-id=28 op=LOAD Dec 13 14:32:21.116000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:32:21.116000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:32:21.118000 audit: BPF prog-id=29 op=LOAD Dec 13 14:32:21.118000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:32:21.120000 audit: BPF prog-id=30 op=LOAD Dec 13 14:32:21.120000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:32:21.120000 audit: BPF prog-id=31 op=LOAD Dec 13 14:32:21.120000 audit: BPF prog-id=32 op=LOAD Dec 13 14:32:21.120000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:32:21.120000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:32:21.126177 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:32:21.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.134150 systemd[1]: Starting audit-rules.service... Dec 13 14:32:21.137524 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:32:21.140646 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:32:21.141000 audit: BPF prog-id=33 op=LOAD Dec 13 14:32:21.144000 audit: BPF prog-id=34 op=LOAD Dec 13 14:32:21.144286 systemd[1]: Starting systemd-resolved.service... Dec 13 14:32:21.148016 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:32:21.150669 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:32:21.170035 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:32:21.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.171775 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:32:21.182884 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:21.183277 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:32:21.185585 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:32:21.190829 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:32:21.196391 systemd[1]: Starting modprobe@loop.service... Dec 13 14:32:21.197955 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:32:21.198188 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:32:21.198367 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:32:21.198658 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:21.200180 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:32:21.200390 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:32:21.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.203484 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:32:21.207785 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:32:21.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.211100 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:32:21.224000 audit[1677]: SYSTEM_BOOT pid=1677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.233352 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:21.234158 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:32:21.238369 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:32:21.242904 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:32:21.244552 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:32:21.245651 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:32:21.246154 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:32:21.246505 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:21.248905 systemd-networkd[1456]: eth0: Gained IPv6LL Dec 13 14:32:21.251926 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:32:21.252490 systemd[1]: Finished modprobe@loop.service. Dec 13 14:32:21.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.257135 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:32:21.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.260277 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:32:21.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.269850 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:21.270590 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:32:21.275392 systemd[1]: Starting modprobe@drm.service... Dec 13 14:32:21.279109 systemd[1]: Starting modprobe@loop.service... Dec 13 14:32:21.280165 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:32:21.280371 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:32:21.281181 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:32:21.281408 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:32:21.285093 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:32:21.287707 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:32:21.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.297214 systemd[1]: Finished ensure-sysext.service. Dec 13 14:32:21.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.299445 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:32:21.299934 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:32:21.301298 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:32:21.331700 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:32:21.331887 systemd[1]: Finished modprobe@drm.service. Dec 13 14:32:21.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.334656 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:32:21.335116 systemd[1]: Finished modprobe@loop.service. Dec 13 14:32:21.336199 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:32:21.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.344418 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:32:21.345543 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:32:21.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.350287 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:32:21.426729 augenrules[1699]: No rules Dec 13 14:32:21.424000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:32:21.424000 audit[1699]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff3ba3da00 a2=420 a3=0 items=0 ppid=1672 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:21.424000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:32:21.434960 systemd[1]: Finished audit-rules.service. Dec 13 14:32:21.436188 systemd-resolved[1675]: Positive Trust Anchors: Dec 13 14:32:21.436208 systemd-resolved[1675]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:32:21.436262 systemd-resolved[1675]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:32:21.437854 ldconfig[1566]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:32:21.447872 systemd[1]: Finished ldconfig.service. Dec 13 14:32:21.451065 systemd[1]: Starting systemd-update-done.service... Dec 13 14:32:21.466259 systemd[1]: Finished systemd-update-done.service. Dec 13 14:32:21.484509 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:32:21.485734 systemd[1]: Reached target time-set.target. Dec 13 14:32:21.507298 systemd-resolved[1675]: Defaulting to hostname 'linux'. Dec 13 14:32:21.509635 systemd[1]: Started systemd-resolved.service. Dec 13 14:32:21.510924 systemd[1]: Reached target network.target. Dec 13 14:32:21.512112 systemd[1]: Reached target network-online.target. Dec 13 14:32:21.513304 systemd[1]: Reached target nss-lookup.target. Dec 13 14:32:21.514638 systemd[1]: Reached target sysinit.target. Dec 13 14:32:21.515737 systemd[1]: Started motdgen.path. Dec 13 14:32:21.517115 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:32:21.519425 systemd[1]: Started logrotate.timer. Dec 13 14:32:21.520339 systemd[1]: Started mdadm.timer. Dec 13 14:32:21.521148 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:32:21.522279 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:32:21.522321 systemd[1]: Reached target paths.target. Dec 13 14:32:21.523393 systemd[1]: Reached target timers.target. Dec 13 14:32:21.531238 systemd[1]: Listening on dbus.socket. Dec 13 14:32:21.545374 systemd[1]: Starting docker.socket... Dec 13 14:32:21.564134 systemd[1]: Listening on sshd.socket. Dec 13 14:32:21.565604 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:32:21.566282 systemd[1]: Listening on docker.socket. Dec 13 14:32:21.567315 systemd[1]: Reached target sockets.target. Dec 13 14:32:21.568276 systemd[1]: Reached target basic.target. Dec 13 14:32:21.569250 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:32:21.569289 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:32:21.571494 systemd[1]: Started amazon-ssm-agent.service. Dec 13 14:32:21.575259 systemd[1]: Starting containerd.service... Dec 13 14:32:21.579897 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 14:32:22.297786 systemd-resolved[1675]: Clock change detected. Flushing caches. Dec 13 14:32:22.298038 systemd-timesyncd[1676]: Contacted time server 107.172.16.131:123 (0.flatcar.pool.ntp.org). Dec 13 14:32:22.314645 systemd-timesyncd[1676]: Initial clock synchronization to Fri 2024-12-13 14:32:22.297729 UTC. Dec 13 14:32:22.316980 systemd[1]: Starting dbus.service... Dec 13 14:32:22.319797 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:32:22.325962 systemd[1]: Starting extend-filesystems.service... Dec 13 14:32:22.327349 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:32:22.332111 systemd[1]: Starting kubelet.service... Dec 13 14:32:22.334821 systemd[1]: Starting motdgen.service... Dec 13 14:32:22.338010 systemd[1]: Started nvidia.service. Dec 13 14:32:22.342537 systemd[1]: Starting prepare-helm.service... Dec 13 14:32:22.346286 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:32:22.349667 systemd[1]: Starting sshd-keygen.service... Dec 13 14:32:22.377764 jq[1712]: false Dec 13 14:32:22.356708 systemd[1]: Starting systemd-logind.service... Dec 13 14:32:22.361503 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:32:22.361599 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:32:22.365161 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:32:22.372063 systemd[1]: Starting update-engine.service... Dec 13 14:32:22.375982 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:32:22.383905 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:32:22.398532 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:32:22.512768 jq[1724]: true Dec 13 14:32:22.530579 tar[1728]: linux-amd64/helm Dec 13 14:32:22.535615 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:32:22.536142 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:32:22.603436 jq[1746]: true Dec 13 14:32:22.612046 dbus-daemon[1711]: [system] SELinux support is enabled Dec 13 14:32:22.612614 systemd[1]: Started dbus.service. Dec 13 14:32:22.617190 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:32:22.617234 systemd[1]: Reached target system-config.target. Dec 13 14:32:22.618964 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:32:22.618998 systemd[1]: Reached target user-config.target. Dec 13 14:32:22.620778 dbus-daemon[1711]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1456 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 14:32:22.622672 dbus-daemon[1711]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 14:32:22.623155 extend-filesystems[1713]: Found loop1 Dec 13 14:32:22.625561 extend-filesystems[1713]: Found nvme0n1 Dec 13 14:32:22.626847 extend-filesystems[1713]: Found nvme0n1p1 Dec 13 14:32:22.628311 systemd[1]: Starting systemd-hostnamed.service... Dec 13 14:32:22.631607 extend-filesystems[1713]: Found nvme0n1p2 Dec 13 14:32:22.632973 extend-filesystems[1713]: Found nvme0n1p3 Dec 13 14:32:22.634636 extend-filesystems[1713]: Found usr Dec 13 14:32:22.636718 extend-filesystems[1713]: Found nvme0n1p4 Dec 13 14:32:22.638193 extend-filesystems[1713]: Found nvme0n1p6 Dec 13 14:32:22.643562 extend-filesystems[1713]: Found nvme0n1p7 Dec 13 14:32:22.644734 extend-filesystems[1713]: Found nvme0n1p9 Dec 13 14:32:22.648819 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:32:22.649038 systemd[1]: Finished motdgen.service. Dec 13 14:32:22.666072 extend-filesystems[1713]: Checking size of /dev/nvme0n1p9 Dec 13 14:32:22.754386 extend-filesystems[1713]: Resized partition /dev/nvme0n1p9 Dec 13 14:32:22.762476 extend-filesystems[1770]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:32:22.774377 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Dec 13 14:32:22.817209 update_engine[1723]: I1213 14:32:22.808099 1723 main.cc:92] Flatcar Update Engine starting Dec 13 14:32:22.827022 systemd[1]: Started update-engine.service. Dec 13 14:32:22.831125 systemd[1]: Started locksmithd.service. Dec 13 14:32:22.839151 update_engine[1723]: I1213 14:32:22.828238 1723 update_check_scheduler.cc:74] Next update check in 6m48s Dec 13 14:32:22.839538 amazon-ssm-agent[1708]: 2024/12/13 14:32:22 Failed to load instance info from vault. RegistrationKey does not exist. Dec 13 14:32:22.850386 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Dec 13 14:32:22.910920 amazon-ssm-agent[1708]: Initializing new seelog logger Dec 13 14:32:22.912393 extend-filesystems[1770]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Dec 13 14:32:22.912393 extend-filesystems[1770]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 14:32:22.912393 extend-filesystems[1770]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Dec 13 14:32:22.918795 env[1734]: time="2024-12-13T14:32:22.912268402Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:32:22.919292 amazon-ssm-agent[1708]: New Seelog Logger Creation Complete Dec 13 14:32:22.919292 amazon-ssm-agent[1708]: 2024/12/13 14:32:22 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Dec 13 14:32:22.919292 amazon-ssm-agent[1708]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Dec 13 14:32:22.919292 amazon-ssm-agent[1708]: 2024/12/13 14:32:22 processing appconfig overrides Dec 13 14:32:22.915099 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:32:22.920294 extend-filesystems[1713]: Resized filesystem in /dev/nvme0n1p9 Dec 13 14:32:22.915322 systemd[1]: Finished extend-filesystems.service. Dec 13 14:32:22.928658 bash[1777]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:32:22.923300 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:32:23.011662 systemd[1]: nvidia.service: Deactivated successfully. Dec 13 14:32:23.033152 systemd-logind[1722]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:32:23.039023 systemd-logind[1722]: Watching system buttons on /dev/input/event2 (Sleep Button) Dec 13 14:32:23.043433 systemd-logind[1722]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:32:23.046488 systemd-logind[1722]: New seat seat0. Dec 13 14:32:23.061568 systemd[1]: Started systemd-logind.service. Dec 13 14:32:23.137893 env[1734]: time="2024-12-13T14:32:23.137708570Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:32:23.138027 env[1734]: time="2024-12-13T14:32:23.137961439Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:32:23.142524 env[1734]: time="2024-12-13T14:32:23.141432496Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:32:23.142524 env[1734]: time="2024-12-13T14:32:23.141480799Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:32:23.142524 env[1734]: time="2024-12-13T14:32:23.142304424Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:32:23.142524 env[1734]: time="2024-12-13T14:32:23.142334263Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:32:23.142524 env[1734]: time="2024-12-13T14:32:23.142373648Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:32:23.142524 env[1734]: time="2024-12-13T14:32:23.142389141Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:32:23.142524 env[1734]: time="2024-12-13T14:32:23.142486853Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:32:23.143014 env[1734]: time="2024-12-13T14:32:23.142984334Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:32:23.143458 env[1734]: time="2024-12-13T14:32:23.143201513Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:32:23.143538 env[1734]: time="2024-12-13T14:32:23.143464038Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:32:23.143597 env[1734]: time="2024-12-13T14:32:23.143555612Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:32:23.143597 env[1734]: time="2024-12-13T14:32:23.143577342Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:32:23.160577 env[1734]: time="2024-12-13T14:32:23.160507630Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:32:23.160737 env[1734]: time="2024-12-13T14:32:23.160584644Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:32:23.160737 env[1734]: time="2024-12-13T14:32:23.160603560Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:32:23.160737 env[1734]: time="2024-12-13T14:32:23.160643943Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:32:23.160737 env[1734]: time="2024-12-13T14:32:23.160669477Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:32:23.160737 env[1734]: time="2024-12-13T14:32:23.160688533Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:32:23.160737 env[1734]: time="2024-12-13T14:32:23.160706388Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:32:23.160737 env[1734]: time="2024-12-13T14:32:23.160723790Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:32:23.160989 env[1734]: time="2024-12-13T14:32:23.160742342Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:32:23.160989 env[1734]: time="2024-12-13T14:32:23.160762326Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:32:23.160989 env[1734]: time="2024-12-13T14:32:23.160781576Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:32:23.160989 env[1734]: time="2024-12-13T14:32:23.160801373Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:32:23.160989 env[1734]: time="2024-12-13T14:32:23.160937780Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:32:23.161237 env[1734]: time="2024-12-13T14:32:23.161040203Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:32:23.161515 env[1734]: time="2024-12-13T14:32:23.161476633Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:32:23.161575 env[1734]: time="2024-12-13T14:32:23.161526532Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:32:23.161575 env[1734]: time="2024-12-13T14:32:23.161548323Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:32:23.161652 env[1734]: time="2024-12-13T14:32:23.161614057Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:32:23.161652 env[1734]: time="2024-12-13T14:32:23.161634536Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:32:23.162066 env[1734]: time="2024-12-13T14:32:23.161653333Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:32:23.162066 env[1734]: time="2024-12-13T14:32:23.161996222Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:32:23.162066 env[1734]: time="2024-12-13T14:32:23.162016656Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:32:23.162066 env[1734]: time="2024-12-13T14:32:23.162033058Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:32:23.162066 env[1734]: time="2024-12-13T14:32:23.162053637Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:32:23.162344 env[1734]: time="2024-12-13T14:32:23.162071969Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:32:23.162344 env[1734]: time="2024-12-13T14:32:23.162094253Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:32:23.162452 env[1734]: time="2024-12-13T14:32:23.162378943Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:32:23.162452 env[1734]: time="2024-12-13T14:32:23.162405650Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:32:23.162452 env[1734]: time="2024-12-13T14:32:23.162424946Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:32:23.162563 env[1734]: time="2024-12-13T14:32:23.162453132Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:32:23.162563 env[1734]: time="2024-12-13T14:32:23.162476453Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:32:23.162563 env[1734]: time="2024-12-13T14:32:23.162495508Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:32:23.162563 env[1734]: time="2024-12-13T14:32:23.162521213Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:32:23.162711 env[1734]: time="2024-12-13T14:32:23.162566368Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:32:23.162930 env[1734]: time="2024-12-13T14:32:23.162855748Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:32:23.164946 env[1734]: time="2024-12-13T14:32:23.162944826Z" level=info msg="Connect containerd service" Dec 13 14:32:23.164946 env[1734]: time="2024-12-13T14:32:23.163000250Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:32:23.167238 env[1734]: time="2024-12-13T14:32:23.167195175Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:32:23.172582 env[1734]: time="2024-12-13T14:32:23.172539354Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:32:23.172709 env[1734]: time="2024-12-13T14:32:23.172613975Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:32:23.172757 systemd[1]: Started containerd.service. Dec 13 14:32:23.174606 env[1734]: time="2024-12-13T14:32:23.174572527Z" level=info msg="containerd successfully booted in 0.302825s" Dec 13 14:32:23.174999 env[1734]: time="2024-12-13T14:32:23.174962226Z" level=info msg="Start subscribing containerd event" Dec 13 14:32:23.175090 env[1734]: time="2024-12-13T14:32:23.175071470Z" level=info msg="Start recovering state" Dec 13 14:32:23.175181 env[1734]: time="2024-12-13T14:32:23.175163809Z" level=info msg="Start event monitor" Dec 13 14:32:23.175240 env[1734]: time="2024-12-13T14:32:23.175185049Z" level=info msg="Start snapshots syncer" Dec 13 14:32:23.175240 env[1734]: time="2024-12-13T14:32:23.175205442Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:32:23.175240 env[1734]: time="2024-12-13T14:32:23.175218319Z" level=info msg="Start streaming server" Dec 13 14:32:23.209637 dbus-daemon[1711]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 14:32:23.209848 systemd[1]: Started systemd-hostnamed.service. Dec 13 14:32:23.213163 dbus-daemon[1711]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1753 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 14:32:23.222023 systemd[1]: Starting polkit.service... Dec 13 14:32:23.293525 polkitd[1811]: Started polkitd version 121 Dec 13 14:32:23.345320 polkitd[1811]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 14:32:23.352349 polkitd[1811]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 14:32:23.354047 polkitd[1811]: Finished loading, compiling and executing 2 rules Dec 13 14:32:23.354684 dbus-daemon[1711]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 14:32:23.354874 systemd[1]: Started polkit.service. Dec 13 14:32:23.359304 polkitd[1811]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 14:32:23.381208 systemd-hostnamed[1753]: Hostname set to (transient) Dec 13 14:32:23.381208 systemd-resolved[1675]: System hostname changed to 'ip-172-31-19-209'. Dec 13 14:32:23.509555 coreos-metadata[1710]: Dec 13 14:32:23.500 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Dec 13 14:32:23.516276 coreos-metadata[1710]: Dec 13 14:32:23.516 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Dec 13 14:32:23.516571 coreos-metadata[1710]: Dec 13 14:32:23.516 INFO Fetch successful Dec 13 14:32:23.516737 coreos-metadata[1710]: Dec 13 14:32:23.516 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 14:32:23.516851 coreos-metadata[1710]: Dec 13 14:32:23.516 INFO Fetch successful Dec 13 14:32:23.519309 unknown[1710]: wrote ssh authorized keys file for user: core Dec 13 14:32:23.620741 update-ssh-keys[1834]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:32:23.621656 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 14:32:23.625763 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO Create new startup processor Dec 13 14:32:23.627051 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [LongRunningPluginsManager] registered plugins: {} Dec 13 14:32:23.627157 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO Initializing bookkeeping folders Dec 13 14:32:23.627157 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO removing the completed state files Dec 13 14:32:23.627157 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO Initializing bookkeeping folders for long running plugins Dec 13 14:32:23.627157 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Dec 13 14:32:23.627157 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO Initializing healthcheck folders for long running plugins Dec 13 14:32:23.627157 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO Initializing locations for inventory plugin Dec 13 14:32:23.627157 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO Initializing default location for custom inventory Dec 13 14:32:23.627618 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO Initializing default location for file inventory Dec 13 14:32:23.627618 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO Initializing default location for role inventory Dec 13 14:32:23.627618 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO Init the cloudwatchlogs publisher Dec 13 14:32:23.627618 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [instanceID=i-0637a79d470bbfed9] Successfully loaded platform independent plugin aws:refreshAssociation Dec 13 14:32:23.627618 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [instanceID=i-0637a79d470bbfed9] Successfully loaded platform independent plugin aws:runPowerShellScript Dec 13 14:32:23.627618 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [instanceID=i-0637a79d470bbfed9] Successfully loaded platform independent plugin aws:updateSsmAgent Dec 13 14:32:23.627618 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [instanceID=i-0637a79d470bbfed9] Successfully loaded platform independent plugin aws:runDockerAction Dec 13 14:32:23.627618 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [instanceID=i-0637a79d470bbfed9] Successfully loaded platform independent plugin aws:configurePackage Dec 13 14:32:23.627618 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [instanceID=i-0637a79d470bbfed9] Successfully loaded platform independent plugin aws:downloadContent Dec 13 14:32:23.627618 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [instanceID=i-0637a79d470bbfed9] Successfully loaded platform independent plugin aws:runDocument Dec 13 14:32:23.627618 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [instanceID=i-0637a79d470bbfed9] Successfully loaded platform independent plugin aws:softwareInventory Dec 13 14:32:23.627618 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [instanceID=i-0637a79d470bbfed9] Successfully loaded platform independent plugin aws:configureDocker Dec 13 14:32:23.627618 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [instanceID=i-0637a79d470bbfed9] Successfully loaded platform dependent plugin aws:runShellScript Dec 13 14:32:23.627618 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Dec 13 14:32:23.627618 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO OS: linux, Arch: amd64 Dec 13 14:32:23.638266 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [MessagingDeliveryService] Starting document processing engine... Dec 13 14:32:23.639959 amazon-ssm-agent[1708]: datastore file /var/lib/amazon/ssm/i-0637a79d470bbfed9/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Dec 13 14:32:23.745101 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [MessagingDeliveryService] [EngineProcessor] Starting Dec 13 14:32:23.836988 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Dec 13 14:32:23.931456 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [MessagingDeliveryService] Starting message polling Dec 13 14:32:24.026209 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [MessagingDeliveryService] Starting send replies to MDS Dec 13 14:32:24.121173 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [instanceID=i-0637a79d470bbfed9] Starting association polling Dec 13 14:32:24.216207 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Dec 13 14:32:24.281904 tar[1728]: linux-amd64/LICENSE Dec 13 14:32:24.282452 tar[1728]: linux-amd64/README.md Dec 13 14:32:24.291891 systemd[1]: Finished prepare-helm.service. Dec 13 14:32:24.312857 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [MessagingDeliveryService] [Association] Launching response handler Dec 13 14:32:24.412964 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Dec 13 14:32:24.508747 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Dec 13 14:32:24.603335 locksmithd[1778]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:32:24.604600 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Dec 13 14:32:24.700799 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [MessageGatewayService] Starting session document processing engine... Dec 13 14:32:24.797029 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [MessageGatewayService] [EngineProcessor] Starting Dec 13 14:32:24.893512 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Dec 13 14:32:24.927677 systemd[1]: Started kubelet.service. Dec 13 14:32:24.990248 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0637a79d470bbfed9, requestId: 80e0330c-4fb8-4204-a8a1-b85752789bbb Dec 13 14:32:25.087067 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [OfflineService] Starting document processing engine... Dec 13 14:32:25.184124 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [OfflineService] [EngineProcessor] Starting Dec 13 14:32:25.281466 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [OfflineService] [EngineProcessor] Initial processing Dec 13 14:32:25.378850 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [OfflineService] Starting message polling Dec 13 14:32:25.476546 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [OfflineService] Starting send replies to MDS Dec 13 14:32:25.574448 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [LongRunningPluginsManager] starting long running plugin manager Dec 13 14:32:25.673838 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Dec 13 14:32:25.772092 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [HealthCheck] HealthCheck reporting agent health. Dec 13 14:32:25.830731 kubelet[1921]: E1213 14:32:25.830618 1921 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:32:25.833250 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:32:25.833454 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:32:25.833851 systemd[1]: kubelet.service: Consumed 1.300s CPU time. Dec 13 14:32:25.870503 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [MessageGatewayService] listening reply. Dec 13 14:32:25.969287 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Dec 13 14:32:26.068509 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [StartupProcessor] Executing startup processor tasks Dec 13 14:32:26.167645 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Dec 13 14:32:26.266840 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Dec 13 14:32:26.366293 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.6 Dec 13 14:32:26.462509 sshd_keygen[1747]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:32:26.465864 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0637a79d470bbfed9?role=subscribe&stream=input Dec 13 14:32:26.491344 systemd[1]: Finished sshd-keygen.service. Dec 13 14:32:26.494149 systemd[1]: Starting issuegen.service... Dec 13 14:32:26.511306 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:32:26.511955 systemd[1]: Finished issuegen.service. Dec 13 14:32:26.516029 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:32:26.533277 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:32:26.535923 systemd[1]: Started getty@tty1.service. Dec 13 14:32:26.540207 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:32:26.541543 systemd[1]: Reached target getty.target. Dec 13 14:32:26.542820 systemd[1]: Reached target multi-user.target. Dec 13 14:32:26.545472 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:32:26.566736 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0637a79d470bbfed9?role=subscribe&stream=input Dec 13 14:32:26.576226 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:32:26.576448 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:32:26.577940 systemd[1]: Startup finished in 696ms (kernel) + 8.374s (initrd) + 13.683s (userspace) = 22.753s. Dec 13 14:32:26.666659 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [MessageGatewayService] Starting receiving message from control channel Dec 13 14:32:26.767509 amazon-ssm-agent[1708]: 2024-12-13 14:32:23 INFO [MessageGatewayService] [EngineProcessor] Initial processing Dec 13 14:32:31.094485 systemd[1]: Created slice system-sshd.slice. Dec 13 14:32:31.096671 systemd[1]: Started sshd@0-172.31.19.209:22-139.178.89.65:45792.service. Dec 13 14:32:31.304991 sshd[1942]: Accepted publickey for core from 139.178.89.65 port 45792 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:32:31.308617 sshd[1942]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:31.333070 systemd[1]: Created slice user-500.slice. Dec 13 14:32:31.336797 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:32:31.341064 systemd-logind[1722]: New session 1 of user core. Dec 13 14:32:31.352081 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:32:31.357181 systemd[1]: Starting user@500.service... Dec 13 14:32:31.362413 (systemd)[1945]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:31.536443 systemd[1945]: Queued start job for default target default.target. Dec 13 14:32:31.537649 systemd[1945]: Reached target paths.target. Dec 13 14:32:31.537746 systemd[1945]: Reached target sockets.target. Dec 13 14:32:31.537766 systemd[1945]: Reached target timers.target. Dec 13 14:32:31.537784 systemd[1945]: Reached target basic.target. Dec 13 14:32:31.537844 systemd[1945]: Reached target default.target. Dec 13 14:32:31.537886 systemd[1945]: Startup finished in 165ms. Dec 13 14:32:31.538324 systemd[1]: Started user@500.service. Dec 13 14:32:31.540321 systemd[1]: Started session-1.scope. Dec 13 14:32:31.709530 systemd[1]: Started sshd@1-172.31.19.209:22-139.178.89.65:45794.service. Dec 13 14:32:31.876982 sshd[1954]: Accepted publickey for core from 139.178.89.65 port 45794 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:32:31.878707 sshd[1954]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:31.884442 systemd-logind[1722]: New session 2 of user core. Dec 13 14:32:31.885772 systemd[1]: Started session-2.scope. Dec 13 14:32:32.015320 sshd[1954]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:32.026019 systemd[1]: sshd@1-172.31.19.209:22-139.178.89.65:45794.service: Deactivated successfully. Dec 13 14:32:32.028123 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:32:32.032769 systemd-logind[1722]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:32:32.036646 systemd-logind[1722]: Removed session 2. Dec 13 14:32:32.054216 systemd[1]: Started sshd@2-172.31.19.209:22-139.178.89.65:45810.service. Dec 13 14:32:32.263348 sshd[1960]: Accepted publickey for core from 139.178.89.65 port 45810 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:32:32.264898 sshd[1960]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:32.280516 systemd-logind[1722]: New session 3 of user core. Dec 13 14:32:32.280847 systemd[1]: Started session-3.scope. Dec 13 14:32:32.414322 sshd[1960]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:32.418278 systemd[1]: sshd@2-172.31.19.209:22-139.178.89.65:45810.service: Deactivated successfully. Dec 13 14:32:32.419339 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:32:32.420103 systemd-logind[1722]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:32:32.423141 systemd-logind[1722]: Removed session 3. Dec 13 14:32:32.452229 systemd[1]: Started sshd@3-172.31.19.209:22-139.178.89.65:45822.service. Dec 13 14:32:32.623088 sshd[1967]: Accepted publickey for core from 139.178.89.65 port 45822 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:32:32.624335 sshd[1967]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:32.635026 systemd-logind[1722]: New session 4 of user core. Dec 13 14:32:32.636581 systemd[1]: Started session-4.scope. Dec 13 14:32:32.763392 sshd[1967]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:32.767216 systemd[1]: sshd@3-172.31.19.209:22-139.178.89.65:45822.service: Deactivated successfully. Dec 13 14:32:32.768098 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:32:32.774021 systemd-logind[1722]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:32:32.779857 systemd-logind[1722]: Removed session 4. Dec 13 14:32:32.791971 systemd[1]: Started sshd@4-172.31.19.209:22-139.178.89.65:45826.service. Dec 13 14:32:32.955860 sshd[1973]: Accepted publickey for core from 139.178.89.65 port 45826 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:32:32.957106 sshd[1973]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:32.964053 systemd[1]: Started session-5.scope. Dec 13 14:32:32.964938 systemd-logind[1722]: New session 5 of user core. Dec 13 14:32:33.097919 sudo[1976]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:32:33.098250 sudo[1976]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:32:33.108465 dbus-daemon[1711]: н\xbaapU: received setenforce notice (enforcing=-2132578912) Dec 13 14:32:33.112912 sudo[1976]: pam_unix(sudo:session): session closed for user root Dec 13 14:32:33.136568 sshd[1973]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:33.140791 systemd[1]: sshd@4-172.31.19.209:22-139.178.89.65:45826.service: Deactivated successfully. Dec 13 14:32:33.141752 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:32:33.142885 systemd-logind[1722]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:32:33.144678 systemd-logind[1722]: Removed session 5. Dec 13 14:32:33.163074 systemd[1]: Started sshd@5-172.31.19.209:22-139.178.89.65:45840.service. Dec 13 14:32:33.342833 sshd[1980]: Accepted publickey for core from 139.178.89.65 port 45840 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:32:33.345555 sshd[1980]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:33.355480 systemd[1]: Started session-6.scope. Dec 13 14:32:33.356314 systemd-logind[1722]: New session 6 of user core. Dec 13 14:32:33.458551 sudo[1984]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:32:33.459169 sudo[1984]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:32:33.462651 sudo[1984]: pam_unix(sudo:session): session closed for user root Dec 13 14:32:33.472113 sudo[1983]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:32:33.472786 sudo[1983]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:32:33.486287 systemd[1]: Stopping audit-rules.service... Dec 13 14:32:33.489380 kernel: kauditd_printk_skb: 221 callbacks suppressed Dec 13 14:32:33.489473 kernel: audit: type=1305 audit(1734100353.486:201): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:32:33.486000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:32:33.491527 auditctl[1987]: No rules Dec 13 14:32:33.492295 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:32:33.492661 systemd[1]: Stopped audit-rules.service. Dec 13 14:32:33.486000 audit[1987]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc1ff58d70 a2=420 a3=0 items=0 ppid=1 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:33.494862 systemd[1]: Starting audit-rules.service... Dec 13 14:32:33.503534 kernel: audit: type=1300 audit(1734100353.486:201): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc1ff58d70 a2=420 a3=0 items=0 ppid=1 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:33.486000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:32:33.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:33.513396 kernel: audit: type=1327 audit(1734100353.486:201): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:32:33.513545 kernel: audit: type=1131 audit(1734100353.491:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:33.531888 augenrules[2004]: No rules Dec 13 14:32:33.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:33.534127 sudo[1983]: pam_unix(sudo:session): session closed for user root Dec 13 14:32:33.532616 systemd[1]: Finished audit-rules.service. Dec 13 14:32:33.537412 kernel: audit: type=1130 audit(1734100353.531:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:33.532000 audit[1983]: USER_END pid=1983 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:32:33.533000 audit[1983]: CRED_DISP pid=1983 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:32:33.547298 kernel: audit: type=1106 audit(1734100353.532:204): pid=1983 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:32:33.547424 kernel: audit: type=1104 audit(1734100353.533:205): pid=1983 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:32:33.561530 sshd[1980]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:33.566000 audit[1980]: USER_END pid=1980 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:32:33.569858 systemd[1]: sshd@5-172.31.19.209:22-139.178.89.65:45840.service: Deactivated successfully. Dec 13 14:32:33.570909 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:32:33.566000 audit[1980]: CRED_DISP pid=1980 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:32:33.574694 systemd-logind[1722]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:32:33.576957 systemd-logind[1722]: Removed session 6. Dec 13 14:32:33.578227 kernel: audit: type=1106 audit(1734100353.566:206): pid=1980 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:32:33.578654 kernel: audit: type=1104 audit(1734100353.566:207): pid=1980 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:32:33.578694 kernel: audit: type=1131 audit(1734100353.568:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.19.209:22-139.178.89.65:45840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:33.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.19.209:22-139.178.89.65:45840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:33.586413 systemd[1]: Started sshd@6-172.31.19.209:22-139.178.89.65:45854.service. Dec 13 14:32:33.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.19.209:22-139.178.89.65:45854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:33.747000 audit[2010]: USER_ACCT pid=2010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:32:33.749415 sshd[2010]: Accepted publickey for core from 139.178.89.65 port 45854 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:32:33.749000 audit[2010]: CRED_ACQ pid=2010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:32:33.750000 audit[2010]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbdb31a40 a2=3 a3=0 items=0 ppid=1 pid=2010 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:33.750000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:32:33.752081 sshd[2010]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:33.759214 systemd[1]: Started session-7.scope. Dec 13 14:32:33.760007 systemd-logind[1722]: New session 7 of user core. Dec 13 14:32:33.764000 audit[2010]: USER_START pid=2010 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:32:33.766000 audit[2012]: CRED_ACQ pid=2012 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:32:33.881000 audit[2013]: USER_ACCT pid=2013 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:32:33.881000 audit[2013]: CRED_REFR pid=2013 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:32:33.883139 sudo[2013]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:32:33.884859 sudo[2013]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:32:33.891000 audit[2013]: USER_START pid=2013 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:32:33.961974 systemd[1]: Starting docker.service... Dec 13 14:32:34.016980 env[2023]: time="2024-12-13T14:32:34.016876063Z" level=info msg="Starting up" Dec 13 14:32:34.019086 env[2023]: time="2024-12-13T14:32:34.019044934Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:32:34.019086 env[2023]: time="2024-12-13T14:32:34.019067244Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:32:34.019397 env[2023]: time="2024-12-13T14:32:34.019090936Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:32:34.019397 env[2023]: time="2024-12-13T14:32:34.019104317Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:32:34.022289 env[2023]: time="2024-12-13T14:32:34.022260906Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:32:34.022422 env[2023]: time="2024-12-13T14:32:34.022386864Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:32:34.022471 env[2023]: time="2024-12-13T14:32:34.022417809Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:32:34.022514 env[2023]: time="2024-12-13T14:32:34.022433401Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:32:34.031142 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2822118623-merged.mount: Deactivated successfully. Dec 13 14:32:34.088815 env[2023]: time="2024-12-13T14:32:34.088773110Z" level=info msg="Loading containers: start." Dec 13 14:32:34.321000 audit[2055]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=2055 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:34.321000 audit[2055]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffde44b9aa0 a2=0 a3=7ffde44b9a8c items=0 ppid=2023 pid=2055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:34.321000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 14:32:34.327000 audit[2057]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2057 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:34.327000 audit[2057]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffcdfb1bce0 a2=0 a3=7ffcdfb1bccc items=0 ppid=2023 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:34.327000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 14:32:34.332000 audit[2059]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=2059 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:34.332000 audit[2059]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe2f0d33f0 a2=0 a3=7ffe2f0d33dc items=0 ppid=2023 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:34.332000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:32:34.336000 audit[2061]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=2061 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:34.336000 audit[2061]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff53b32600 a2=0 a3=7fff53b325ec items=0 ppid=2023 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:34.336000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:32:34.341000 audit[2063]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2063 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:34.341000 audit[2063]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff5a43de80 a2=0 a3=7fff5a43de6c items=0 ppid=2023 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:34.341000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 14:32:34.365000 audit[2068]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=2068 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:34.365000 audit[2068]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff068335c0 a2=0 a3=7fff068335ac items=0 ppid=2023 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:34.365000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 14:32:34.377000 audit[2070]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=2070 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:34.377000 audit[2070]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff12b8b830 a2=0 a3=7fff12b8b81c items=0 ppid=2023 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:34.377000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 14:32:34.379000 audit[2072]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2072 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:34.379000 audit[2072]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe2432f6b0 a2=0 a3=7ffe2432f69c items=0 ppid=2023 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:34.379000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 14:32:34.381000 audit[2074]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2074 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:34.381000 audit[2074]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffef2d494d0 a2=0 a3=7ffef2d494bc items=0 ppid=2023 pid=2074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:34.381000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:32:34.395000 audit[2078]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2078 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:34.395000 audit[2078]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd9a0ec4d0 a2=0 a3=7ffd9a0ec4bc items=0 ppid=2023 pid=2078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:34.395000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:32:34.406000 audit[2079]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2079 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:34.406000 audit[2079]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcd6c545d0 a2=0 a3=7ffcd6c545bc items=0 ppid=2023 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:34.406000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:32:34.418390 kernel: Initializing XFRM netlink socket Dec 13 14:32:34.456558 env[2023]: time="2024-12-13T14:32:34.456517330Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 14:32:34.457700 (udev-worker)[2035]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:32:34.507000 audit[2087]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2087 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:34.507000 audit[2087]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffec72883f0 a2=0 a3=7ffec72883dc items=0 ppid=2023 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:34.507000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 14:32:34.554000 audit[2090]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2090 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:34.554000 audit[2090]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe8c94cb20 a2=0 a3=7ffe8c94cb0c items=0 ppid=2023 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:34.554000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 14:32:34.557000 audit[2093]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2093 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:34.557000 audit[2093]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc16a19ef0 a2=0 a3=7ffc16a19edc items=0 ppid=2023 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:34.557000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 14:32:34.559000 audit[2095]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2095 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:34.559000 audit[2095]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdb450f6a0 a2=0 a3=7ffdb450f68c items=0 ppid=2023 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:34.559000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 14:32:34.562000 audit[2097]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2097 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:34.562000 audit[2097]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe65e004e0 a2=0 a3=7ffe65e004cc items=0 ppid=2023 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:34.562000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 14:32:34.564000 audit[2099]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2099 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:34.564000 audit[2099]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd92b115d0 a2=0 a3=7ffd92b115bc items=0 ppid=2023 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:34.564000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 14:32:34.566000 audit[2101]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2101 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:34.566000 audit[2101]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd230b13c0 a2=0 a3=7ffd230b13ac items=0 ppid=2023 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:34.566000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 14:32:34.577000 audit[2104]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2104 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:34.577000 audit[2104]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffdb81eaf80 a2=0 a3=7ffdb81eaf6c items=0 ppid=2023 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:34.577000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 14:32:34.580000 audit[2106]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2106 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:34.580000 audit[2106]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe6db850d0 a2=0 a3=7ffe6db850bc items=0 ppid=2023 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:34.580000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:32:34.582000 audit[2108]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2108 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:34.582000 audit[2108]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffdd4ac5790 a2=0 a3=7ffdd4ac577c items=0 ppid=2023 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:34.582000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:32:34.585000 audit[2110]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2110 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:34.585000 audit[2110]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe1e58ba30 a2=0 a3=7ffe1e58ba1c items=0 ppid=2023 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:34.585000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 14:32:34.587167 systemd-networkd[1456]: docker0: Link UP Dec 13 14:32:34.598000 audit[2114]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2114 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:34.598000 audit[2114]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffec1296980 a2=0 a3=7ffec129696c items=0 ppid=2023 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:34.598000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:32:34.605000 audit[2115]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2115 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:34.605000 audit[2115]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd21692430 a2=0 a3=7ffd2169241c items=0 ppid=2023 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:34.605000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:32:34.607190 env[2023]: time="2024-12-13T14:32:34.607150382Z" level=info msg="Loading containers: done." Dec 13 14:32:34.664153 env[2023]: time="2024-12-13T14:32:34.664104857Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 14:32:34.664402 env[2023]: time="2024-12-13T14:32:34.664341283Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 14:32:34.664573 env[2023]: time="2024-12-13T14:32:34.664487364Z" level=info msg="Daemon has completed initialization" Dec 13 14:32:34.684500 systemd[1]: Started docker.service. Dec 13 14:32:34.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:34.695833 env[2023]: time="2024-12-13T14:32:34.695764437Z" level=info msg="API listen on /run/docker.sock" Dec 13 14:32:36.084635 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:32:36.084922 systemd[1]: Stopped kubelet.service. Dec 13 14:32:36.084991 systemd[1]: kubelet.service: Consumed 1.300s CPU time. Dec 13 14:32:36.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:36.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:36.087449 systemd[1]: Starting kubelet.service... Dec 13 14:32:36.158639 env[1734]: time="2024-12-13T14:32:36.158480446Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\"" Dec 13 14:32:36.452793 systemd[1]: Started kubelet.service. Dec 13 14:32:36.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:36.516666 kubelet[2157]: E1213 14:32:36.516633 2157 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:32:36.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:32:36.521160 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:32:36.521404 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:32:36.858975 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount455659357.mount: Deactivated successfully. Dec 13 14:32:40.323531 env[1734]: time="2024-12-13T14:32:40.323407922Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:40.327474 env[1734]: time="2024-12-13T14:32:40.327429774Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:40.329924 env[1734]: time="2024-12-13T14:32:40.329882833Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:40.332470 env[1734]: time="2024-12-13T14:32:40.332428187Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:f0e1b3de0c2e98e6c6abd73edf9d3b8e4d44460656cde0ebb92e2d9206961fcb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:40.333169 env[1734]: time="2024-12-13T14:32:40.333133941Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\" returns image reference \"sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd\"" Dec 13 14:32:40.353075 env[1734]: time="2024-12-13T14:32:40.353029668Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\"" Dec 13 14:32:43.612912 env[1734]: time="2024-12-13T14:32:43.612840515Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:43.620381 env[1734]: time="2024-12-13T14:32:43.620308212Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:43.622994 env[1734]: time="2024-12-13T14:32:43.622948972Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:43.627489 env[1734]: time="2024-12-13T14:32:43.627445198Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:124f66b7e877eb5a80a40503057299bb60e6a5f2130905f4e3293dabf194c397,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:43.628692 env[1734]: time="2024-12-13T14:32:43.628650469Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\" returns image reference \"sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6\"" Dec 13 14:32:43.644285 env[1734]: time="2024-12-13T14:32:43.644254336Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\"" Dec 13 14:32:43.911144 amazon-ssm-agent[1708]: 2024-12-13 14:32:43 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Dec 13 14:32:45.909278 env[1734]: time="2024-12-13T14:32:45.909222783Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:45.913656 env[1734]: time="2024-12-13T14:32:45.912344434Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:45.916401 env[1734]: time="2024-12-13T14:32:45.916342728Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:45.923326 env[1734]: time="2024-12-13T14:32:45.923235987Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c8bdeac2590c99c1a77e33995423ddb6633ff90a82a2aa455442e0a8079ef8c7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:45.931629 env[1734]: time="2024-12-13T14:32:45.931549588Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\" returns image reference \"sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43\"" Dec 13 14:32:45.967451 env[1734]: time="2024-12-13T14:32:45.967410391Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 14:32:46.774159 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:32:46.774447 systemd[1]: Stopped kubelet.service. Dec 13 14:32:46.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:46.776721 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 14:32:46.776783 kernel: audit: type=1130 audit(1734100366.773:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:46.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:46.784344 kernel: audit: type=1131 audit(1734100366.773:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:46.784751 systemd[1]: Starting kubelet.service... Dec 13 14:32:47.420413 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2602536580.mount: Deactivated successfully. Dec 13 14:32:47.543579 systemd[1]: Started kubelet.service. Dec 13 14:32:47.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:47.551389 kernel: audit: type=1130 audit(1734100367.542:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:47.649224 kubelet[2184]: E1213 14:32:47.649178 2184 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:32:47.651896 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:32:47.652070 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:32:47.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:32:47.657384 kernel: audit: type=1131 audit(1734100367.651:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:32:48.421946 env[1734]: time="2024-12-13T14:32:48.421892456Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:48.424489 env[1734]: time="2024-12-13T14:32:48.424439810Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:48.426590 env[1734]: time="2024-12-13T14:32:48.426478639Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:48.428523 env[1734]: time="2024-12-13T14:32:48.428483246Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:48.429118 env[1734]: time="2024-12-13T14:32:48.429083063Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2\"" Dec 13 14:32:48.441785 env[1734]: time="2024-12-13T14:32:48.441740069Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 14:32:49.111763 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2418684503.mount: Deactivated successfully. Dec 13 14:32:50.533195 env[1734]: time="2024-12-13T14:32:50.533143914Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:50.536007 env[1734]: time="2024-12-13T14:32:50.535964303Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:50.538885 env[1734]: time="2024-12-13T14:32:50.538825767Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:50.541469 env[1734]: time="2024-12-13T14:32:50.541423866Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:50.542334 env[1734]: time="2024-12-13T14:32:50.542298635Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 14:32:50.607784 env[1734]: time="2024-12-13T14:32:50.607735964Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 14:32:51.117087 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3128032306.mount: Deactivated successfully. Dec 13 14:32:51.124825 env[1734]: time="2024-12-13T14:32:51.124705478Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:51.128122 env[1734]: time="2024-12-13T14:32:51.128078132Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:51.130267 env[1734]: time="2024-12-13T14:32:51.130230520Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:51.132069 env[1734]: time="2024-12-13T14:32:51.132035700Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:51.132531 env[1734]: time="2024-12-13T14:32:51.132498271Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 14:32:51.145637 env[1734]: time="2024-12-13T14:32:51.145599583Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" Dec 13 14:32:51.731323 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3325282757.mount: Deactivated successfully. Dec 13 14:32:53.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:53.414656 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 14:32:53.420418 kernel: audit: type=1131 audit(1734100373.413:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:53.437000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:32:53.437000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:32:53.440654 kernel: audit: type=1334 audit(1734100373.437:252): prog-id=40 op=UNLOAD Dec 13 14:32:53.440704 kernel: audit: type=1334 audit(1734100373.437:253): prog-id=39 op=UNLOAD Dec 13 14:32:53.440734 kernel: audit: type=1334 audit(1734100373.437:254): prog-id=38 op=UNLOAD Dec 13 14:32:53.437000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:32:56.043204 env[1734]: time="2024-12-13T14:32:56.043139421Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:56.046319 env[1734]: time="2024-12-13T14:32:56.046275911Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:56.049160 env[1734]: time="2024-12-13T14:32:56.049117648Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:56.058773 env[1734]: time="2024-12-13T14:32:56.058716140Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" Dec 13 14:32:56.060262 env[1734]: time="2024-12-13T14:32:56.060223916Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:57.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:57.903193 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 14:32:57.903495 systemd[1]: Stopped kubelet.service. Dec 13 14:32:57.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:57.907731 systemd[1]: Starting kubelet.service... Dec 13 14:32:57.911477 kernel: audit: type=1130 audit(1734100377.902:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:57.911570 kernel: audit: type=1131 audit(1734100377.902:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:59.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:59.058597 systemd[1]: Started kubelet.service. Dec 13 14:32:59.063385 kernel: audit: type=1130 audit(1734100379.057:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:59.142427 kubelet[2271]: E1213 14:32:59.142387 2271 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:32:59.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:32:59.145026 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:32:59.145192 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:32:59.149472 kernel: audit: type=1131 audit(1734100379.144:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:32:59.574428 systemd[1]: Stopped kubelet.service. Dec 13 14:32:59.584520 kernel: audit: type=1130 audit(1734100379.573:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:59.584638 kernel: audit: type=1131 audit(1734100379.573:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:59.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:59.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:59.578248 systemd[1]: Starting kubelet.service... Dec 13 14:32:59.609711 systemd[1]: Reloading. Dec 13 14:32:59.756127 /usr/lib/systemd/system-generators/torcx-generator[2305]: time="2024-12-13T14:32:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:32:59.756736 /usr/lib/systemd/system-generators/torcx-generator[2305]: time="2024-12-13T14:32:59Z" level=info msg="torcx already run" Dec 13 14:32:59.891535 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:32:59.891561 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:32:59.919345 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:33:00.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.094870 kernel: audit: type=1400 audit(1734100380.082:261): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.099660 kernel: audit: type=1400 audit(1734100380.082:262): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.109430 kernel: audit: type=1400 audit(1734100380.082:263): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.120879 kernel: audit: type=1400 audit(1734100380.082:264): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.121297 kernel: audit: type=1400 audit(1734100380.082:265): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.130519 kernel: audit: type=1400 audit(1734100380.082:266): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.093000 audit: BPF prog-id=43 op=LOAD Dec 13 14:33:00.098000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:33:00.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.108000 audit: BPF prog-id=44 op=LOAD Dec 13 14:33:00.108000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:33:00.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.112000 audit: BPF prog-id=45 op=LOAD Dec 13 14:33:00.112000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:33:00.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.119000 audit: BPF prog-id=46 op=LOAD Dec 13 14:33:00.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.119000 audit: BPF prog-id=47 op=LOAD Dec 13 14:33:00.119000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:33:00.119000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:33:00.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.129000 audit: BPF prog-id=48 op=LOAD Dec 13 14:33:00.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit: BPF prog-id=50 op=LOAD Dec 13 14:33:00.136000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit: BPF prog-id=51 op=LOAD Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.136000 audit: BPF prog-id=52 op=LOAD Dec 13 14:33:00.137000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:33:00.137000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:33:00.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.138000 audit: BPF prog-id=53 op=LOAD Dec 13 14:33:00.138000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:33:00.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.150000 audit: BPF prog-id=54 op=LOAD Dec 13 14:33:00.150000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:33:00.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.151000 audit: BPF prog-id=55 op=LOAD Dec 13 14:33:00.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.151000 audit: BPF prog-id=56 op=LOAD Dec 13 14:33:00.151000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:33:00.151000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:33:00.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:00.154000 audit: BPF prog-id=57 op=LOAD Dec 13 14:33:00.154000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:33:00.225487 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:33:00.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:00.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:00.225768 systemd[1]: Stopped kubelet.service. Dec 13 14:33:00.230339 systemd[1]: Starting kubelet.service... Dec 13 14:33:00.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:00.618539 systemd[1]: Started kubelet.service. Dec 13 14:33:00.690730 kubelet[2362]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:33:00.691050 kubelet[2362]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:33:00.691092 kubelet[2362]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:33:00.692704 kubelet[2362]: I1213 14:33:00.692660 2362 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:33:01.346876 kubelet[2362]: I1213 14:33:01.346830 2362 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 14:33:01.346876 kubelet[2362]: I1213 14:33:01.346864 2362 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:33:01.347167 kubelet[2362]: I1213 14:33:01.347145 2362 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 14:33:01.412319 kubelet[2362]: I1213 14:33:01.411721 2362 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:33:01.434773 kubelet[2362]: E1213 14:33:01.434730 2362 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.19.209:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.19.209:6443: connect: connection refused Dec 13 14:33:01.495943 kubelet[2362]: I1213 14:33:01.495903 2362 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:33:01.498821 kubelet[2362]: I1213 14:33:01.498741 2362 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:33:01.499071 kubelet[2362]: I1213 14:33:01.498816 2362 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-19-209","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:33:01.499232 kubelet[2362]: I1213 14:33:01.499088 2362 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:33:01.499232 kubelet[2362]: I1213 14:33:01.499104 2362 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:33:01.499323 kubelet[2362]: I1213 14:33:01.499271 2362 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:33:01.502005 kubelet[2362]: I1213 14:33:01.501919 2362 kubelet.go:400] "Attempting to sync node with API server" Dec 13 14:33:01.502185 kubelet[2362]: I1213 14:33:01.502167 2362 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:33:01.502263 kubelet[2362]: I1213 14:33:01.502213 2362 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:33:01.502263 kubelet[2362]: I1213 14:33:01.502240 2362 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:33:01.502820 kubelet[2362]: W1213 14:33:01.502744 2362 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.19.209:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-19-209&limit=500&resourceVersion=0": dial tcp 172.31.19.209:6443: connect: connection refused Dec 13 14:33:01.502820 kubelet[2362]: E1213 14:33:01.502817 2362 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.19.209:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-19-209&limit=500&resourceVersion=0": dial tcp 172.31.19.209:6443: connect: connection refused Dec 13 14:33:01.512417 kubelet[2362]: W1213 14:33:01.512332 2362 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.19.209:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.19.209:6443: connect: connection refused Dec 13 14:33:01.512637 kubelet[2362]: E1213 14:33:01.512625 2362 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.19.209:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.19.209:6443: connect: connection refused Dec 13 14:33:01.513833 kubelet[2362]: I1213 14:33:01.513780 2362 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:33:01.521949 kubelet[2362]: I1213 14:33:01.521894 2362 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:33:01.522100 kubelet[2362]: W1213 14:33:01.522002 2362 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:33:01.526127 kubelet[2362]: I1213 14:33:01.526081 2362 server.go:1264] "Started kubelet" Dec 13 14:33:01.544937 kubelet[2362]: I1213 14:33:01.544892 2362 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:33:01.552596 kubelet[2362]: I1213 14:33:01.552508 2362 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:33:01.553014 kubelet[2362]: I1213 14:33:01.552991 2362 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:33:01.553148 kubelet[2362]: I1213 14:33:01.553135 2362 server.go:455] "Adding debug handlers to kubelet server" Dec 13 14:33:01.565347 kubelet[2362]: E1213 14:33:01.565194 2362 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.19.209:6443/api/v1/namespaces/default/events\": dial tcp 172.31.19.209:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-19-209.1810c31bfdbab739 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-19-209,UID:ip-172-31-19-209,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-19-209,},FirstTimestamp:2024-12-13 14:33:01.526046521 +0000 UTC m=+0.901551159,LastTimestamp:2024-12-13 14:33:01.526046521 +0000 UTC m=+0.901551159,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-19-209,}" Dec 13 14:33:01.564000 audit[2362]: AVC avc: denied { mac_admin } for pid=2362 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:01.564000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:33:01.564000 audit[2362]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b5d0b0 a1=c000abebe8 a2=c000b5d080 a3=25 items=0 ppid=1 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:01.564000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:33:01.566349 kubelet[2362]: I1213 14:33:01.566315 2362 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:33:01.565000 audit[2362]: AVC avc: denied { mac_admin } for pid=2362 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:01.565000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:33:01.565000 audit[2362]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b7c680 a1=c000abec00 a2=c000b5d140 a3=25 items=0 ppid=1 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:01.565000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:33:01.566795 kubelet[2362]: I1213 14:33:01.566774 2362 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:33:01.571333 kubelet[2362]: I1213 14:33:01.571310 2362 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:33:01.579438 kubelet[2362]: I1213 14:33:01.579075 2362 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:33:01.579438 kubelet[2362]: I1213 14:33:01.579274 2362 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 14:33:01.579438 kubelet[2362]: I1213 14:33:01.579370 2362 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:33:01.579879 kubelet[2362]: W1213 14:33:01.579824 2362 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.19.209:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.19.209:6443: connect: connection refused Dec 13 14:33:01.579963 kubelet[2362]: E1213 14:33:01.579893 2362 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.19.209:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.19.209:6443: connect: connection refused Dec 13 14:33:01.580588 kubelet[2362]: E1213 14:33:01.580519 2362 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.19.209:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-19-209?timeout=10s\": dial tcp 172.31.19.209:6443: connect: connection refused" interval="200ms" Dec 13 14:33:01.580702 kubelet[2362]: E1213 14:33:01.580667 2362 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:33:01.581418 kubelet[2362]: I1213 14:33:01.581400 2362 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:33:01.581611 kubelet[2362]: I1213 14:33:01.581593 2362 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:33:01.583336 kubelet[2362]: I1213 14:33:01.583314 2362 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:33:01.583000 audit[2372]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:01.583000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd9a077d30 a2=0 a3=7ffd9a077d1c items=0 ppid=2362 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:01.583000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:33:01.586000 audit[2373]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:01.586000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff69dc98f0 a2=0 a3=7fff69dc98dc items=0 ppid=2362 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:01.586000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:33:01.600000 audit[2378]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2378 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:01.600000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffceb9a33e0 a2=0 a3=7ffceb9a33cc items=0 ppid=2362 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:01.600000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:33:01.629000 audit[2382]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2382 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:01.629000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc3d1a59e0 a2=0 a3=7ffc3d1a59cc items=0 ppid=2362 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:01.629000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:33:01.635244 kubelet[2362]: I1213 14:33:01.635220 2362 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:33:01.635469 kubelet[2362]: I1213 14:33:01.635455 2362 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:33:01.637827 kubelet[2362]: I1213 14:33:01.637804 2362 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:33:01.653808 kubelet[2362]: I1213 14:33:01.653770 2362 policy_none.go:49] "None policy: Start" Dec 13 14:33:01.656413 kubelet[2362]: I1213 14:33:01.656389 2362 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:33:01.656602 kubelet[2362]: I1213 14:33:01.656589 2362 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:33:01.679100 systemd[1]: Created slice kubepods.slice. Dec 13 14:33:01.693305 kubelet[2362]: I1213 14:33:01.689624 2362 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-19-209" Dec 13 14:33:01.696376 kubelet[2362]: E1213 14:33:01.695054 2362 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.19.209:6443/api/v1/nodes\": dial tcp 172.31.19.209:6443: connect: connection refused" node="ip-172-31-19-209" Dec 13 14:33:01.696000 audit[2386]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:01.696000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc231b6100 a2=0 a3=7ffc231b60ec items=0 ppid=2362 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:01.696000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:33:01.708968 kubelet[2362]: I1213 14:33:01.701163 2362 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:33:01.708547 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:33:01.714000 audit[2388]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:01.714000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe6f25d920 a2=0 a3=7ffe6f25d90c items=0 ppid=2362 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:01.714000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:33:01.715000 audit[2387]: NETFILTER_CFG table=mangle:32 family=10 entries=2 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:01.715000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffd32e0ab0 a2=0 a3=7fffd32e0a9c items=0 ppid=2362 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:01.715000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:33:01.724745 kubelet[2362]: I1213 14:33:01.724712 2362 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:33:01.724920 kubelet[2362]: I1213 14:33:01.724910 2362 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:33:01.725031 kubelet[2362]: I1213 14:33:01.725020 2362 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 14:33:01.725214 kubelet[2362]: E1213 14:33:01.725173 2362 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:33:01.728601 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:33:01.730000 audit[2389]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:01.730000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd701b1b70 a2=0 a3=7ffd701b1b5c items=0 ppid=2362 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:01.730000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:33:01.734471 kubelet[2362]: W1213 14:33:01.734398 2362 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.19.209:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.19.209:6443: connect: connection refused Dec 13 14:33:01.734471 kubelet[2362]: E1213 14:33:01.734467 2362 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.19.209:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.19.209:6443: connect: connection refused Dec 13 14:33:01.735000 audit[2391]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:01.740000 audit[2390]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=2390 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:01.735000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd70104c80 a2=0 a3=7ffd70104c6c items=0 ppid=2362 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:01.740000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd24df84b0 a2=0 a3=10e3 items=0 ppid=2362 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:01.740000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:33:01.735000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:33:01.743562 kubelet[2362]: I1213 14:33:01.743533 2362 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:33:01.742000 audit[2362]: AVC avc: denied { mac_admin } for pid=2362 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:01.742000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:33:01.742000 audit[2362]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d6df50 a1=c0009a1ba8 a2=c000d6df20 a3=25 items=0 ppid=1 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:01.751000 audit[2392]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=2392 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:01.751000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcbef5ff20 a2=0 a3=7ffcbef5ff0c items=0 ppid=2362 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:01.751000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:33:01.742000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:33:01.754973 kubelet[2362]: I1213 14:33:01.754946 2362 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:33:01.755545 kubelet[2362]: I1213 14:33:01.755473 2362 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:33:01.755647 kubelet[2362]: I1213 14:33:01.755634 2362 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:33:01.755000 audit[2393]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2393 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:01.755000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe901b3570 a2=0 a3=7ffe901b355c items=0 ppid=2362 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:01.755000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:33:01.766764 kubelet[2362]: E1213 14:33:01.766724 2362 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-19-209\" not found" Dec 13 14:33:01.783037 kubelet[2362]: E1213 14:33:01.782850 2362 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.19.209:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-19-209?timeout=10s\": dial tcp 172.31.19.209:6443: connect: connection refused" interval="400ms" Dec 13 14:33:01.831584 kubelet[2362]: I1213 14:33:01.831514 2362 topology_manager.go:215] "Topology Admit Handler" podUID="8ac6852c0a750c56dea72712e5367dfe" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-19-209" Dec 13 14:33:01.833203 kubelet[2362]: I1213 14:33:01.833157 2362 topology_manager.go:215] "Topology Admit Handler" podUID="9ba71c5c01c7b82faf17a35e7195d98b" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-19-209" Dec 13 14:33:01.836658 kubelet[2362]: I1213 14:33:01.836610 2362 topology_manager.go:215] "Topology Admit Handler" podUID="45b26e6f754e590ec944808c67a2e513" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-19-209" Dec 13 14:33:01.856772 systemd[1]: Created slice kubepods-burstable-pod8ac6852c0a750c56dea72712e5367dfe.slice. Dec 13 14:33:01.882311 systemd[1]: Created slice kubepods-burstable-pod45b26e6f754e590ec944808c67a2e513.slice. Dec 13 14:33:01.886571 kubelet[2362]: I1213 14:33:01.884560 2362 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8ac6852c0a750c56dea72712e5367dfe-ca-certs\") pod \"kube-apiserver-ip-172-31-19-209\" (UID: \"8ac6852c0a750c56dea72712e5367dfe\") " pod="kube-system/kube-apiserver-ip-172-31-19-209" Dec 13 14:33:01.886571 kubelet[2362]: I1213 14:33:01.884645 2362 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8ac6852c0a750c56dea72712e5367dfe-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-19-209\" (UID: \"8ac6852c0a750c56dea72712e5367dfe\") " pod="kube-system/kube-apiserver-ip-172-31-19-209" Dec 13 14:33:01.886571 kubelet[2362]: I1213 14:33:01.884679 2362 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/9ba71c5c01c7b82faf17a35e7195d98b-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-19-209\" (UID: \"9ba71c5c01c7b82faf17a35e7195d98b\") " pod="kube-system/kube-controller-manager-ip-172-31-19-209" Dec 13 14:33:01.886571 kubelet[2362]: I1213 14:33:01.886131 2362 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9ba71c5c01c7b82faf17a35e7195d98b-kubeconfig\") pod \"kube-controller-manager-ip-172-31-19-209\" (UID: \"9ba71c5c01c7b82faf17a35e7195d98b\") " pod="kube-system/kube-controller-manager-ip-172-31-19-209" Dec 13 14:33:01.886571 kubelet[2362]: I1213 14:33:01.886278 2362 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/9ba71c5c01c7b82faf17a35e7195d98b-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-19-209\" (UID: \"9ba71c5c01c7b82faf17a35e7195d98b\") " pod="kube-system/kube-controller-manager-ip-172-31-19-209" Dec 13 14:33:01.886844 kubelet[2362]: I1213 14:33:01.886308 2362 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/45b26e6f754e590ec944808c67a2e513-kubeconfig\") pod \"kube-scheduler-ip-172-31-19-209\" (UID: \"45b26e6f754e590ec944808c67a2e513\") " pod="kube-system/kube-scheduler-ip-172-31-19-209" Dec 13 14:33:01.886844 kubelet[2362]: I1213 14:33:01.886349 2362 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8ac6852c0a750c56dea72712e5367dfe-k8s-certs\") pod \"kube-apiserver-ip-172-31-19-209\" (UID: \"8ac6852c0a750c56dea72712e5367dfe\") " pod="kube-system/kube-apiserver-ip-172-31-19-209" Dec 13 14:33:01.886844 kubelet[2362]: I1213 14:33:01.886414 2362 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/9ba71c5c01c7b82faf17a35e7195d98b-ca-certs\") pod \"kube-controller-manager-ip-172-31-19-209\" (UID: \"9ba71c5c01c7b82faf17a35e7195d98b\") " pod="kube-system/kube-controller-manager-ip-172-31-19-209" Dec 13 14:33:01.886844 kubelet[2362]: I1213 14:33:01.886437 2362 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/9ba71c5c01c7b82faf17a35e7195d98b-k8s-certs\") pod \"kube-controller-manager-ip-172-31-19-209\" (UID: \"9ba71c5c01c7b82faf17a35e7195d98b\") " pod="kube-system/kube-controller-manager-ip-172-31-19-209" Dec 13 14:33:01.901759 kubelet[2362]: I1213 14:33:01.901719 2362 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-19-209" Dec 13 14:33:01.905692 systemd[1]: Created slice kubepods-burstable-pod9ba71c5c01c7b82faf17a35e7195d98b.slice. Dec 13 14:33:01.909582 kubelet[2362]: E1213 14:33:01.909482 2362 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.19.209:6443/api/v1/nodes\": dial tcp 172.31.19.209:6443: connect: connection refused" node="ip-172-31-19-209" Dec 13 14:33:02.174906 env[1734]: time="2024-12-13T14:33:02.174769532Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-19-209,Uid:8ac6852c0a750c56dea72712e5367dfe,Namespace:kube-system,Attempt:0,}" Dec 13 14:33:02.183451 kubelet[2362]: E1213 14:33:02.183400 2362 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.19.209:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-19-209?timeout=10s\": dial tcp 172.31.19.209:6443: connect: connection refused" interval="800ms" Dec 13 14:33:02.198484 env[1734]: time="2024-12-13T14:33:02.198431176Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-19-209,Uid:45b26e6f754e590ec944808c67a2e513,Namespace:kube-system,Attempt:0,}" Dec 13 14:33:02.219300 env[1734]: time="2024-12-13T14:33:02.219250988Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-19-209,Uid:9ba71c5c01c7b82faf17a35e7195d98b,Namespace:kube-system,Attempt:0,}" Dec 13 14:33:02.311420 kubelet[2362]: I1213 14:33:02.311350 2362 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-19-209" Dec 13 14:33:02.311792 kubelet[2362]: E1213 14:33:02.311763 2362 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.19.209:6443/api/v1/nodes\": dial tcp 172.31.19.209:6443: connect: connection refused" node="ip-172-31-19-209" Dec 13 14:33:02.385883 kubelet[2362]: W1213 14:33:02.385815 2362 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.19.209:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.19.209:6443: connect: connection refused Dec 13 14:33:02.385883 kubelet[2362]: E1213 14:33:02.385890 2362 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.19.209:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.19.209:6443: connect: connection refused Dec 13 14:33:02.580335 kubelet[2362]: W1213 14:33:02.580199 2362 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.19.209:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-19-209&limit=500&resourceVersion=0": dial tcp 172.31.19.209:6443: connect: connection refused Dec 13 14:33:02.580335 kubelet[2362]: E1213 14:33:02.580267 2362 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.19.209:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-19-209&limit=500&resourceVersion=0": dial tcp 172.31.19.209:6443: connect: connection refused Dec 13 14:33:02.676828 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2376896028.mount: Deactivated successfully. Dec 13 14:33:02.685899 env[1734]: time="2024-12-13T14:33:02.685847968Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:02.688492 env[1734]: time="2024-12-13T14:33:02.688443740Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:02.690030 env[1734]: time="2024-12-13T14:33:02.689986275Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:02.692122 env[1734]: time="2024-12-13T14:33:02.692081405Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:02.700495 env[1734]: time="2024-12-13T14:33:02.700448399Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:02.702023 env[1734]: time="2024-12-13T14:33:02.701979043Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:02.703678 env[1734]: time="2024-12-13T14:33:02.703635411Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:02.705226 env[1734]: time="2024-12-13T14:33:02.705183814Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:02.706772 env[1734]: time="2024-12-13T14:33:02.706736309Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:02.708465 env[1734]: time="2024-12-13T14:33:02.708422950Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:02.710423 env[1734]: time="2024-12-13T14:33:02.710381869Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:02.711904 env[1734]: time="2024-12-13T14:33:02.711863462Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:02.822375 env[1734]: time="2024-12-13T14:33:02.818103069Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:33:02.822375 env[1734]: time="2024-12-13T14:33:02.818200863Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:33:02.822375 env[1734]: time="2024-12-13T14:33:02.818218266Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:33:02.827596 env[1734]: time="2024-12-13T14:33:02.827499039Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3ebb4ac1624234c00f749a26705947cca17d242bf63822c249639f96cb645850 pid=2402 runtime=io.containerd.runc.v2 Dec 13 14:33:02.832007 env[1734]: time="2024-12-13T14:33:02.831844816Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:33:02.832388 env[1734]: time="2024-12-13T14:33:02.832179338Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:33:02.832706 env[1734]: time="2024-12-13T14:33:02.832621734Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:33:02.833035 env[1734]: time="2024-12-13T14:33:02.832989844Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e1d939760a7245176284a92333c4666376450ec05312d85ba026bface57dce1c pid=2415 runtime=io.containerd.runc.v2 Dec 13 14:33:02.839459 kubelet[2362]: W1213 14:33:02.839414 2362 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.19.209:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.19.209:6443: connect: connection refused Dec 13 14:33:02.839459 kubelet[2362]: E1213 14:33:02.839469 2362 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.19.209:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.19.209:6443: connect: connection refused Dec 13 14:33:02.853516 env[1734]: time="2024-12-13T14:33:02.853365141Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:33:02.853715 env[1734]: time="2024-12-13T14:33:02.853526969Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:33:02.853715 env[1734]: time="2024-12-13T14:33:02.853578840Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:33:02.854741 env[1734]: time="2024-12-13T14:33:02.854669643Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/baa02946ebdf0bd750638a000fb2da72d441c322672c24edd9a56751c8113855 pid=2440 runtime=io.containerd.runc.v2 Dec 13 14:33:02.891566 systemd[1]: Started cri-containerd-3ebb4ac1624234c00f749a26705947cca17d242bf63822c249639f96cb645850.scope. Dec 13 14:33:02.905558 kubelet[2362]: W1213 14:33:02.905442 2362 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.19.209:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.19.209:6443: connect: connection refused Dec 13 14:33:02.905558 kubelet[2362]: E1213 14:33:02.905525 2362 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.19.209:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.19.209:6443: connect: connection refused Dec 13 14:33:02.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.927000 audit: BPF prog-id=58 op=LOAD Dec 13 14:33:02.928000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.928000 audit[2422]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2402 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:02.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365626234616331363234323334633030663734396132363730353934 Dec 13 14:33:02.928000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.928000 audit[2422]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2402 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:02.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365626234616331363234323334633030663734396132363730353934 Dec 13 14:33:02.929000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.929000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.929000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.929000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.929000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.929000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.929000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.929000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.929000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.929000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.929000 audit: BPF prog-id=59 op=LOAD Dec 13 14:33:02.929000 audit[2422]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003c81b0 items=0 ppid=2402 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:02.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365626234616331363234323334633030663734396132363730353934 Dec 13 14:33:02.930000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.930000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.930000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.930000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.930000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.930000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.930000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.930000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.930000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.930000 audit: BPF prog-id=60 op=LOAD Dec 13 14:33:02.930000 audit[2422]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003c81f8 items=0 ppid=2402 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:02.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365626234616331363234323334633030663734396132363730353934 Dec 13 14:33:02.931000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:33:02.931000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:33:02.931000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.931000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.931000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.931000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.931000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.931000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.931000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.931000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.931000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.933115 systemd[1]: Started cri-containerd-e1d939760a7245176284a92333c4666376450ec05312d85ba026bface57dce1c.scope. Dec 13 14:33:02.931000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.931000 audit: BPF prog-id=61 op=LOAD Dec 13 14:33:02.931000 audit[2422]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c8608 items=0 ppid=2402 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:02.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365626234616331363234323334633030663734396132363730353934 Dec 13 14:33:02.956889 systemd[1]: Started cri-containerd-baa02946ebdf0bd750638a000fb2da72d441c322672c24edd9a56751c8113855.scope. Dec 13 14:33:02.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.966000 audit: BPF prog-id=62 op=LOAD Dec 13 14:33:02.968000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.968000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2415 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:02.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531643933393736306137323435313736323834613932333333633436 Dec 13 14:33:02.969000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.969000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2415 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:02.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531643933393736306137323435313736323834613932333333633436 Dec 13 14:33:02.970000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.970000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.970000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.970000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.970000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.970000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.970000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.970000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.970000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.970000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.970000 audit: BPF prog-id=63 op=LOAD Dec 13 14:33:02.970000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00031fa60 items=0 ppid=2415 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:02.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531643933393736306137323435313736323834613932333333633436 Dec 13 14:33:02.971000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.971000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.971000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.971000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.971000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.971000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.971000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.971000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.971000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.971000 audit: BPF prog-id=64 op=LOAD Dec 13 14:33:02.971000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00031faa8 items=0 ppid=2415 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:02.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531643933393736306137323435313736323834613932333333633436 Dec 13 14:33:02.972000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:33:02.972000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:33:02.972000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.972000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.972000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.972000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.972000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.972000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.972000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.972000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.972000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.972000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.972000 audit: BPF prog-id=65 op=LOAD Dec 13 14:33:02.972000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00031feb8 items=0 ppid=2415 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:02.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531643933393736306137323435313736323834613932333333633436 Dec 13 14:33:02.984641 kubelet[2362]: E1213 14:33:02.984591 2362 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.19.209:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-19-209?timeout=10s\": dial tcp 172.31.19.209:6443: connect: connection refused" interval="1.6s" Dec 13 14:33:02.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.992000 audit: BPF prog-id=66 op=LOAD Dec 13 14:33:02.993000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.993000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2440 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:02.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261613032393436656264663062643735303633386130303066623264 Dec 13 14:33:02.994000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.994000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2440 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:02.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261613032393436656264663062643735303633386130303066623264 Dec 13 14:33:02.994000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.994000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.994000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.994000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.994000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.994000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.994000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.994000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.994000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.994000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.994000 audit: BPF prog-id=67 op=LOAD Dec 13 14:33:02.994000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000265df0 items=0 ppid=2440 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:02.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261613032393436656264663062643735303633386130303066623264 Dec 13 14:33:02.995000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.995000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.995000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.995000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.995000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.995000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.995000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.995000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.995000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.995000 audit: BPF prog-id=68 op=LOAD Dec 13 14:33:02.995000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000265e38 items=0 ppid=2440 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:02.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261613032393436656264663062643735303633386130303066623264 Dec 13 14:33:02.995000 audit: BPF prog-id=68 op=UNLOAD Dec 13 14:33:02.996000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:33:02.996000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.996000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.996000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.996000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.996000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.996000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.996000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.996000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.996000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.996000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.996000 audit: BPF prog-id=69 op=LOAD Dec 13 14:33:02.996000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003de248 items=0 ppid=2440 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:02.996000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261613032393436656264663062643735303633386130303066623264 Dec 13 14:33:03.041151 env[1734]: time="2024-12-13T14:33:03.041096585Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-19-209,Uid:45b26e6f754e590ec944808c67a2e513,Namespace:kube-system,Attempt:0,} returns sandbox id \"3ebb4ac1624234c00f749a26705947cca17d242bf63822c249639f96cb645850\"" Dec 13 14:33:03.045621 env[1734]: time="2024-12-13T14:33:03.045576680Z" level=info msg="CreateContainer within sandbox \"3ebb4ac1624234c00f749a26705947cca17d242bf63822c249639f96cb645850\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 14:33:03.056506 env[1734]: time="2024-12-13T14:33:03.056454216Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-19-209,Uid:9ba71c5c01c7b82faf17a35e7195d98b,Namespace:kube-system,Attempt:0,} returns sandbox id \"e1d939760a7245176284a92333c4666376450ec05312d85ba026bface57dce1c\"" Dec 13 14:33:03.063978 env[1734]: time="2024-12-13T14:33:03.063908291Z" level=info msg="CreateContainer within sandbox \"e1d939760a7245176284a92333c4666376450ec05312d85ba026bface57dce1c\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 14:33:03.066746 env[1734]: time="2024-12-13T14:33:03.066692298Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-19-209,Uid:8ac6852c0a750c56dea72712e5367dfe,Namespace:kube-system,Attempt:0,} returns sandbox id \"baa02946ebdf0bd750638a000fb2da72d441c322672c24edd9a56751c8113855\"" Dec 13 14:33:03.071070 env[1734]: time="2024-12-13T14:33:03.071029029Z" level=info msg="CreateContainer within sandbox \"baa02946ebdf0bd750638a000fb2da72d441c322672c24edd9a56751c8113855\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 14:33:03.079414 env[1734]: time="2024-12-13T14:33:03.079330449Z" level=info msg="CreateContainer within sandbox \"3ebb4ac1624234c00f749a26705947cca17d242bf63822c249639f96cb645850\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"e6f10cabf1ec447463659008198887f7323a527fea4987ec9dec73a2d22c4212\"" Dec 13 14:33:03.080158 env[1734]: time="2024-12-13T14:33:03.080124970Z" level=info msg="StartContainer for \"e6f10cabf1ec447463659008198887f7323a527fea4987ec9dec73a2d22c4212\"" Dec 13 14:33:03.097297 env[1734]: time="2024-12-13T14:33:03.097168511Z" level=info msg="CreateContainer within sandbox \"e1d939760a7245176284a92333c4666376450ec05312d85ba026bface57dce1c\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"bea8a05236a0e15d5fa01c1a5ca419d2cab218f6f387697b693733091a6215ec\"" Dec 13 14:33:03.102365 env[1734]: time="2024-12-13T14:33:03.102309646Z" level=info msg="StartContainer for \"bea8a05236a0e15d5fa01c1a5ca419d2cab218f6f387697b693733091a6215ec\"" Dec 13 14:33:03.102619 env[1734]: time="2024-12-13T14:33:03.102329518Z" level=info msg="CreateContainer within sandbox \"baa02946ebdf0bd750638a000fb2da72d441c322672c24edd9a56751c8113855\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"55f1c6cb6a25609d60fb48272b6112e46c7f3931be4521a3f42bca4a84ca828c\"" Dec 13 14:33:03.103087 env[1734]: time="2024-12-13T14:33:03.103058572Z" level=info msg="StartContainer for \"55f1c6cb6a25609d60fb48272b6112e46c7f3931be4521a3f42bca4a84ca828c\"" Dec 13 14:33:03.110602 systemd[1]: Started cri-containerd-e6f10cabf1ec447463659008198887f7323a527fea4987ec9dec73a2d22c4212.scope. Dec 13 14:33:03.122596 kubelet[2362]: I1213 14:33:03.122564 2362 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-19-209" Dec 13 14:33:03.122956 kubelet[2362]: E1213 14:33:03.122927 2362 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.19.209:6443/api/v1/nodes\": dial tcp 172.31.19.209:6443: connect: connection refused" node="ip-172-31-19-209" Dec 13 14:33:03.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.162000 audit: BPF prog-id=70 op=LOAD Dec 13 14:33:03.158250 systemd[1]: Started cri-containerd-55f1c6cb6a25609d60fb48272b6112e46c7f3931be4521a3f42bca4a84ca828c.scope. Dec 13 14:33:03.164000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.164000 audit[2524]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2402 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:03.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536663130636162663165633434373436333635393030383139383838 Dec 13 14:33:03.165000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.165000 audit[2524]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2402 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:03.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536663130636162663165633434373436333635393030383139383838 Dec 13 14:33:03.165000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.165000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.165000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.165000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.165000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.165000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.165000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.165000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.165000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.165000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.165000 audit: BPF prog-id=71 op=LOAD Dec 13 14:33:03.165000 audit[2524]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000293050 items=0 ppid=2402 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:03.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536663130636162663165633434373436333635393030383139383838 Dec 13 14:33:03.166000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.166000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.166000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.166000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.166000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.166000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.166000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.166000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.166000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.166000 audit: BPF prog-id=72 op=LOAD Dec 13 14:33:03.166000 audit[2524]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000293098 items=0 ppid=2402 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:03.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536663130636162663165633434373436333635393030383139383838 Dec 13 14:33:03.168000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:33:03.168000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:33:03.169000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.169000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.169000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.169000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.169000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.169000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.169000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.169000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.169000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.169000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.169000 audit: BPF prog-id=73 op=LOAD Dec 13 14:33:03.169000 audit[2524]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0002934a8 items=0 ppid=2402 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:03.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536663130636162663165633434373436333635393030383139383838 Dec 13 14:33:03.178891 systemd[1]: Started cri-containerd-bea8a05236a0e15d5fa01c1a5ca419d2cab218f6f387697b693733091a6215ec.scope. Dec 13 14:33:03.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.208000 audit: BPF prog-id=74 op=LOAD Dec 13 14:33:03.215000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.215000 audit[2547]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2440 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:03.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535663163366362366132353630396436306662343832373262363131 Dec 13 14:33:03.216000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.216000 audit[2547]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2440 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:03.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535663163366362366132353630396436306662343832373262363131 Dec 13 14:33:03.216000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.216000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.216000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.216000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.216000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.216000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.216000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.216000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.216000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.216000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.216000 audit: BPF prog-id=75 op=LOAD Dec 13 14:33:03.216000 audit[2547]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001b83b0 items=0 ppid=2440 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:03.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535663163366362366132353630396436306662343832373262363131 Dec 13 14:33:03.217000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.217000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.217000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.217000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.217000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.217000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.217000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.217000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.217000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.217000 audit: BPF prog-id=76 op=LOAD Dec 13 14:33:03.217000 audit[2547]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001b83f8 items=0 ppid=2440 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:03.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535663163366362366132353630396436306662343832373262363131 Dec 13 14:33:03.224000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:33:03.224000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:33:03.227000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.227000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.227000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.227000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.227000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.227000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.227000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.227000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.227000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.227000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.227000 audit: BPF prog-id=77 op=LOAD Dec 13 14:33:03.227000 audit[2547]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001b8808 items=0 ppid=2440 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:03.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535663163366362366132353630396436306662343832373262363131 Dec 13 14:33:03.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.253000 audit: BPF prog-id=78 op=LOAD Dec 13 14:33:03.256000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.256000 audit[2548]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2415 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:03.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265613861303532333661306531356435666130316331613563613431 Dec 13 14:33:03.256000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.256000 audit[2548]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2415 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:03.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265613861303532333661306531356435666130316331613563613431 Dec 13 14:33:03.256000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.256000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.256000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.256000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.256000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.256000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.256000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.256000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.256000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.256000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.256000 audit: BPF prog-id=79 op=LOAD Dec 13 14:33:03.256000 audit[2548]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003ce000 items=0 ppid=2415 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:03.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265613861303532333661306531356435666130316331613563613431 Dec 13 14:33:03.257000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.257000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.257000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.257000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.257000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.257000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.257000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.257000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.257000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.257000 audit: BPF prog-id=80 op=LOAD Dec 13 14:33:03.257000 audit[2548]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003ce048 items=0 ppid=2415 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:03.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265613861303532333661306531356435666130316331613563613431 Dec 13 14:33:03.257000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:33:03.257000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:33:03.257000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.257000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.257000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.257000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.257000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.257000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.257000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.257000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.257000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.257000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:03.257000 audit: BPF prog-id=81 op=LOAD Dec 13 14:33:03.257000 audit[2548]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ce458 items=0 ppid=2415 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:03.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265613861303532333661306531356435666130316331613563613431 Dec 13 14:33:03.323999 env[1734]: time="2024-12-13T14:33:03.323949214Z" level=info msg="StartContainer for \"55f1c6cb6a25609d60fb48272b6112e46c7f3931be4521a3f42bca4a84ca828c\" returns successfully" Dec 13 14:33:03.331453 env[1734]: time="2024-12-13T14:33:03.331348280Z" level=info msg="StartContainer for \"e6f10cabf1ec447463659008198887f7323a527fea4987ec9dec73a2d22c4212\" returns successfully" Dec 13 14:33:03.348403 env[1734]: time="2024-12-13T14:33:03.348277018Z" level=info msg="StartContainer for \"bea8a05236a0e15d5fa01c1a5ca419d2cab218f6f387697b693733091a6215ec\" returns successfully" Dec 13 14:33:03.502626 kubelet[2362]: E1213 14:33:03.502494 2362 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.19.209:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.19.209:6443: connect: connection refused Dec 13 14:33:04.725654 kubelet[2362]: I1213 14:33:04.725629 2362 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-19-209" Dec 13 14:33:05.508369 kernel: kauditd_printk_skb: 575 callbacks suppressed Dec 13 14:33:05.508623 kernel: audit: type=1400 audit(1734100385.501:551): avc: denied { watch } for pid=2581 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:05.501000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:05.501000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000059bc0 a2=fc6 a3=0 items=0 ppid=2415 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 key=(null) Dec 13 14:33:05.517385 kernel: audit: type=1300 audit(1734100385.501:551): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000059bc0 a2=fc6 a3=0 items=0 ppid=2415 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 key=(null) Dec 13 14:33:05.501000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:05.523508 kernel: audit: type=1327 audit(1734100385.501:551): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:05.523699 kernel: audit: type=1400 audit(1734100385.507:552): avc: denied { watch } for pid=2581 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:05.507000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:05.540528 kernel: audit: type=1300 audit(1734100385.507:552): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00036c0c0 a2=fc6 a3=0 items=0 ppid=2415 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 key=(null) Dec 13 14:33:05.507000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00036c0c0 a2=fc6 a3=0 items=0 ppid=2415 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 key=(null) Dec 13 14:33:05.546215 kernel: audit: type=1327 audit(1734100385.507:552): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:05.507000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:06.423161 kernel: audit: type=1400 audit(1734100386.410:553): avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:06.423508 kernel: audit: type=1300 audit(1734100386.410:553): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0061d3c20 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:33:06.410000 audit[2574]: AVC avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:06.410000 audit[2574]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0061d3c20 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:33:06.410000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:33:06.434103 kernel: audit: type=1327 audit(1734100386.410:553): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:33:06.434237 kernel: audit: type=1400 audit(1734100386.410:554): avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:06.410000 audit[2574]: AVC avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:06.410000 audit[2574]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0049d2660 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:33:06.410000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:33:06.411000 audit[2574]: AVC avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:06.411000 audit[2574]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0061d3d40 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:33:06.411000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:33:06.428000 audit[2574]: AVC avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:06.428000 audit[2574]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5a a1=c003d17170 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:33:06.428000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:33:06.460000 audit[2574]: AVC avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:06.460000 audit[2574]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c0049d3cc0 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:33:06.460000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:33:06.460000 audit[2574]: AVC avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:06.460000 audit[2574]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c006f08f30 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:33:06.460000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:33:06.639767 kubelet[2362]: E1213 14:33:06.639724 2362 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-19-209\" not found" node="ip-172-31-19-209" Dec 13 14:33:06.807751 kubelet[2362]: I1213 14:33:06.807570 2362 kubelet_node_status.go:76] "Successfully registered node" node="ip-172-31-19-209" Dec 13 14:33:07.510258 kubelet[2362]: I1213 14:33:07.510215 2362 apiserver.go:52] "Watching apiserver" Dec 13 14:33:07.580435 kubelet[2362]: I1213 14:33:07.580404 2362 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 14:33:07.828545 update_engine[1723]: I1213 14:33:07.828414 1723 update_attempter.cc:509] Updating boot flags... Dec 13 14:33:09.085199 systemd[1]: Reloading. Dec 13 14:33:09.245767 /usr/lib/systemd/system-generators/torcx-generator[2746]: time="2024-12-13T14:33:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:33:09.246765 /usr/lib/systemd/system-generators/torcx-generator[2746]: time="2024-12-13T14:33:09Z" level=info msg="torcx already run" Dec 13 14:33:09.456417 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:33:09.456439 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:33:09.484334 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:33:09.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.625000 audit: BPF prog-id=82 op=LOAD Dec 13 14:33:09.625000 audit: BPF prog-id=62 op=UNLOAD Dec 13 14:33:09.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.628000 audit: BPF prog-id=83 op=LOAD Dec 13 14:33:09.628000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:33:09.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.634000 audit: BPF prog-id=84 op=LOAD Dec 13 14:33:09.634000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:33:09.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.635000 audit: BPF prog-id=85 op=LOAD Dec 13 14:33:09.635000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:33:09.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.637000 audit: BPF prog-id=86 op=LOAD Dec 13 14:33:09.637000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit: BPF prog-id=87 op=LOAD Dec 13 14:33:09.639000 audit: BPF prog-id=45 op=UNLOAD Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit: BPF prog-id=88 op=LOAD Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.639000 audit: BPF prog-id=89 op=LOAD Dec 13 14:33:09.639000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:33:09.639000 audit: BPF prog-id=47 op=UNLOAD Dec 13 14:33:09.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.640000 audit: BPF prog-id=90 op=LOAD Dec 13 14:33:09.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.640000 audit: BPF prog-id=91 op=LOAD Dec 13 14:33:09.640000 audit: BPF prog-id=48 op=UNLOAD Dec 13 14:33:09.640000 audit: BPF prog-id=49 op=UNLOAD Dec 13 14:33:09.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.642000 audit: BPF prog-id=92 op=LOAD Dec 13 14:33:09.642000 audit: BPF prog-id=58 op=UNLOAD Dec 13 14:33:09.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.645000 audit: BPF prog-id=93 op=LOAD Dec 13 14:33:09.645000 audit: BPF prog-id=50 op=UNLOAD Dec 13 14:33:09.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.645000 audit: BPF prog-id=94 op=LOAD Dec 13 14:33:09.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.645000 audit: BPF prog-id=95 op=LOAD Dec 13 14:33:09.645000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:33:09.645000 audit: BPF prog-id=52 op=UNLOAD Dec 13 14:33:09.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.647000 audit: BPF prog-id=96 op=LOAD Dec 13 14:33:09.647000 audit: BPF prog-id=53 op=UNLOAD Dec 13 14:33:09.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.652000 audit: BPF prog-id=97 op=LOAD Dec 13 14:33:09.652000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:33:09.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.660000 audit: BPF prog-id=98 op=LOAD Dec 13 14:33:09.660000 audit: BPF prog-id=54 op=UNLOAD Dec 13 14:33:09.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.660000 audit: BPF prog-id=99 op=LOAD Dec 13 14:33:09.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.660000 audit: BPF prog-id=100 op=LOAD Dec 13 14:33:09.660000 audit: BPF prog-id=55 op=UNLOAD Dec 13 14:33:09.660000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:33:09.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.663000 audit: BPF prog-id=101 op=LOAD Dec 13 14:33:09.663000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:33:09.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:09.664000 audit: BPF prog-id=102 op=LOAD Dec 13 14:33:09.664000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:33:09.690571 systemd[1]: Stopping kubelet.service... Dec 13 14:33:09.705745 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:33:09.706029 systemd[1]: Stopped kubelet.service. Dec 13 14:33:09.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:09.706115 systemd[1]: kubelet.service: Consumed 1.030s CPU time. Dec 13 14:33:09.709002 systemd[1]: Starting kubelet.service... Dec 13 14:33:10.441000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:10.442000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:10.442000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e14760 a2=fc6 a3=0 items=0 ppid=2415 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 key=(null) Dec 13 14:33:10.442000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:10.443000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:10.443000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e147a0 a2=fc6 a3=0 items=0 ppid=2415 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 key=(null) Dec 13 14:33:10.443000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:10.444000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:10.444000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e14ae0 a2=fc6 a3=0 items=0 ppid=2415 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 key=(null) Dec 13 14:33:10.444000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:10.441000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000eb0cc0 a2=fc6 a3=0 items=0 ppid=2415 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 key=(null) Dec 13 14:33:10.441000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:11.497558 systemd[1]: Started kubelet.service. Dec 13 14:33:11.503274 kernel: kauditd_printk_skb: 271 callbacks suppressed Dec 13 14:33:11.503423 kernel: audit: type=1130 audit(1734100391.496:808): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:11.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:11.666085 kubelet[2802]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:33:11.666593 kubelet[2802]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:33:11.666667 kubelet[2802]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:33:11.668692 kubelet[2802]: I1213 14:33:11.668640 2802 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:33:11.681468 kubelet[2802]: I1213 14:33:11.679611 2802 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 14:33:11.681800 kubelet[2802]: I1213 14:33:11.681780 2802 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:33:11.682349 kubelet[2802]: I1213 14:33:11.682322 2802 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 14:33:11.686237 kubelet[2802]: I1213 14:33:11.686208 2802 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 14:33:11.700514 kubelet[2802]: I1213 14:33:11.700482 2802 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:33:11.724829 kubelet[2802]: I1213 14:33:11.724787 2802 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:33:11.725398 kubelet[2802]: I1213 14:33:11.725339 2802 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:33:11.725782 kubelet[2802]: I1213 14:33:11.725503 2802 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-19-209","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:33:11.726005 kubelet[2802]: I1213 14:33:11.725992 2802 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:33:11.726174 kubelet[2802]: I1213 14:33:11.726163 2802 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:33:11.726447 kubelet[2802]: I1213 14:33:11.726426 2802 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:33:11.735896 kubelet[2802]: I1213 14:33:11.735864 2802 kubelet.go:400] "Attempting to sync node with API server" Dec 13 14:33:11.735896 kubelet[2802]: I1213 14:33:11.735904 2802 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:33:11.736251 kubelet[2802]: I1213 14:33:11.735946 2802 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:33:11.736251 kubelet[2802]: I1213 14:33:11.735963 2802 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:33:11.769090 kubelet[2802]: I1213 14:33:11.758865 2802 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:33:11.769246 kubelet[2802]: I1213 14:33:11.769226 2802 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:33:11.779232 kubelet[2802]: I1213 14:33:11.778972 2802 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:33:11.782904 kubelet[2802]: I1213 14:33:11.782879 2802 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:33:11.804443 kernel: audit: type=1400 audit(1734100391.790:809): avc: denied { mac_admin } for pid=2802 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:11.804639 kernel: audit: type=1401 audit(1734100391.790:809): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:33:11.790000 audit[2802]: AVC avc: denied { mac_admin } for pid=2802 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:11.790000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:33:11.815018 kernel: audit: type=1300 audit(1734100391.790:809): arch=c000003e syscall=188 success=no exit=-22 a0=c000b640f0 a1=c00094ab70 a2=c000b640c0 a3=25 items=0 ppid=1 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:11.790000 audit[2802]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b640f0 a1=c00094ab70 a2=c000b640c0 a3=25 items=0 ppid=1 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:11.815676 kubelet[2802]: I1213 14:33:11.815634 2802 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:33:11.815878 kubelet[2802]: I1213 14:33:11.815857 2802 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:33:11.817922 kubelet[2802]: I1213 14:33:11.817899 2802 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:33:11.826765 kernel: audit: type=1327 audit(1734100391.790:809): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:33:11.790000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:33:11.826967 kubelet[2802]: I1213 14:33:11.824764 2802 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:33:11.826967 kubelet[2802]: I1213 14:33:11.825601 2802 server.go:1264] "Started kubelet" Dec 13 14:33:11.836134 kernel: audit: type=1400 audit(1734100391.814:810): avc: denied { mac_admin } for pid=2802 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:11.814000 audit[2802]: AVC avc: denied { mac_admin } for pid=2802 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:11.814000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:33:11.839844 kernel: audit: type=1401 audit(1734100391.814:810): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:33:11.814000 audit[2802]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009459c0 a1=c00094ab88 a2=c000b64180 a3=25 items=0 ppid=1 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:11.845625 kernel: audit: type=1300 audit(1734100391.814:810): arch=c000003e syscall=188 success=no exit=-22 a0=c0009459c0 a1=c00094ab88 a2=c000b64180 a3=25 items=0 ppid=1 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:11.845691 kubelet[2802]: I1213 14:33:11.841095 2802 server.go:455] "Adding debug handlers to kubelet server" Dec 13 14:33:11.814000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:33:11.852639 kubelet[2802]: I1213 14:33:11.850477 2802 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:33:11.854122 kernel: audit: type=1327 audit(1734100391.814:810): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:33:11.854217 kubelet[2802]: I1213 14:33:11.853541 2802 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 14:33:11.856101 kubelet[2802]: I1213 14:33:11.856084 2802 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:33:11.856324 kubelet[2802]: I1213 14:33:11.856307 2802 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:33:11.870474 kubelet[2802]: I1213 14:33:11.870421 2802 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:33:11.876230 kubelet[2802]: I1213 14:33:11.876207 2802 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:33:11.888672 kubelet[2802]: E1213 14:33:11.888645 2802 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:33:11.920431 kubelet[2802]: I1213 14:33:11.919551 2802 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:33:11.929084 kubelet[2802]: I1213 14:33:11.929050 2802 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:33:11.929084 kubelet[2802]: I1213 14:33:11.929092 2802 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:33:11.929299 kubelet[2802]: I1213 14:33:11.929113 2802 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 14:33:11.929299 kubelet[2802]: E1213 14:33:11.929163 2802 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:33:11.958927 kubelet[2802]: I1213 14:33:11.958895 2802 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-19-209" Dec 13 14:33:12.004607 kubelet[2802]: I1213 14:33:12.004565 2802 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:33:12.004943 kubelet[2802]: I1213 14:33:12.004928 2802 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:33:12.005130 kubelet[2802]: I1213 14:33:12.005120 2802 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:33:12.005611 kubelet[2802]: I1213 14:33:12.005584 2802 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 14:33:12.005760 kubelet[2802]: I1213 14:33:12.005731 2802 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 14:33:12.005857 kubelet[2802]: I1213 14:33:12.005848 2802 policy_none.go:49] "None policy: Start" Dec 13 14:33:12.009276 kubelet[2802]: I1213 14:33:12.009246 2802 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:33:12.010446 kubelet[2802]: I1213 14:33:12.010410 2802 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:33:12.012185 kubelet[2802]: I1213 14:33:12.012167 2802 state_mem.go:75] "Updated machine memory state" Dec 13 14:33:12.021774 kubelet[2802]: I1213 14:33:12.019152 2802 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:33:12.023000 audit[2802]: AVC avc: denied { mac_admin } for pid=2802 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:12.023000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:33:12.030166 kernel: audit: type=1400 audit(1734100392.023:811): avc: denied { mac_admin } for pid=2802 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:12.023000 audit[2802]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bde960 a1=c000a16be8 a2=c000bde930 a3=25 items=0 ppid=1 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:12.023000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:33:12.031790 kubelet[2802]: I1213 14:33:12.031766 2802 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:33:12.032339 kubelet[2802]: I1213 14:33:12.032273 2802 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:33:12.032632 kubelet[2802]: I1213 14:33:12.032621 2802 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:33:12.033770 kubelet[2802]: I1213 14:33:12.033737 2802 topology_manager.go:215] "Topology Admit Handler" podUID="8ac6852c0a750c56dea72712e5367dfe" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-19-209" Dec 13 14:33:12.033970 kubelet[2802]: I1213 14:33:12.033956 2802 topology_manager.go:215] "Topology Admit Handler" podUID="9ba71c5c01c7b82faf17a35e7195d98b" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-19-209" Dec 13 14:33:12.034143 kubelet[2802]: I1213 14:33:12.034130 2802 topology_manager.go:215] "Topology Admit Handler" podUID="45b26e6f754e590ec944808c67a2e513" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-19-209" Dec 13 14:33:12.035644 kubelet[2802]: I1213 14:33:12.035600 2802 kubelet_node_status.go:112] "Node was previously registered" node="ip-172-31-19-209" Dec 13 14:33:12.035981 kubelet[2802]: I1213 14:33:12.035969 2802 kubelet_node_status.go:76] "Successfully registered node" node="ip-172-31-19-209" Dec 13 14:33:12.094426 kubelet[2802]: I1213 14:33:12.094390 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8ac6852c0a750c56dea72712e5367dfe-k8s-certs\") pod \"kube-apiserver-ip-172-31-19-209\" (UID: \"8ac6852c0a750c56dea72712e5367dfe\") " pod="kube-system/kube-apiserver-ip-172-31-19-209" Dec 13 14:33:12.094606 kubelet[2802]: I1213 14:33:12.094592 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/9ba71c5c01c7b82faf17a35e7195d98b-ca-certs\") pod \"kube-controller-manager-ip-172-31-19-209\" (UID: \"9ba71c5c01c7b82faf17a35e7195d98b\") " pod="kube-system/kube-controller-manager-ip-172-31-19-209" Dec 13 14:33:12.094677 kubelet[2802]: I1213 14:33:12.094658 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/9ba71c5c01c7b82faf17a35e7195d98b-k8s-certs\") pod \"kube-controller-manager-ip-172-31-19-209\" (UID: \"9ba71c5c01c7b82faf17a35e7195d98b\") " pod="kube-system/kube-controller-manager-ip-172-31-19-209" Dec 13 14:33:12.096334 kubelet[2802]: I1213 14:33:12.096305 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9ba71c5c01c7b82faf17a35e7195d98b-kubeconfig\") pod \"kube-controller-manager-ip-172-31-19-209\" (UID: \"9ba71c5c01c7b82faf17a35e7195d98b\") " pod="kube-system/kube-controller-manager-ip-172-31-19-209" Dec 13 14:33:12.096501 kubelet[2802]: I1213 14:33:12.096388 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8ac6852c0a750c56dea72712e5367dfe-ca-certs\") pod \"kube-apiserver-ip-172-31-19-209\" (UID: \"8ac6852c0a750c56dea72712e5367dfe\") " pod="kube-system/kube-apiserver-ip-172-31-19-209" Dec 13 14:33:12.096501 kubelet[2802]: I1213 14:33:12.096417 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8ac6852c0a750c56dea72712e5367dfe-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-19-209\" (UID: \"8ac6852c0a750c56dea72712e5367dfe\") " pod="kube-system/kube-apiserver-ip-172-31-19-209" Dec 13 14:33:12.096501 kubelet[2802]: I1213 14:33:12.096481 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/9ba71c5c01c7b82faf17a35e7195d98b-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-19-209\" (UID: \"9ba71c5c01c7b82faf17a35e7195d98b\") " pod="kube-system/kube-controller-manager-ip-172-31-19-209" Dec 13 14:33:12.096758 kubelet[2802]: I1213 14:33:12.096509 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/9ba71c5c01c7b82faf17a35e7195d98b-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-19-209\" (UID: \"9ba71c5c01c7b82faf17a35e7195d98b\") " pod="kube-system/kube-controller-manager-ip-172-31-19-209" Dec 13 14:33:12.096758 kubelet[2802]: I1213 14:33:12.096546 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/45b26e6f754e590ec944808c67a2e513-kubeconfig\") pod \"kube-scheduler-ip-172-31-19-209\" (UID: \"45b26e6f754e590ec944808c67a2e513\") " pod="kube-system/kube-scheduler-ip-172-31-19-209" Dec 13 14:33:12.737276 kubelet[2802]: I1213 14:33:12.737241 2802 apiserver.go:52] "Watching apiserver" Dec 13 14:33:12.754416 kubelet[2802]: I1213 14:33:12.754386 2802 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 14:33:13.001646 kubelet[2802]: E1213 14:33:13.001497 2802 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ip-172-31-19-209\" already exists" pod="kube-system/kube-scheduler-ip-172-31-19-209" Dec 13 14:33:13.065077 kubelet[2802]: I1213 14:33:13.064997 2802 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-19-209" podStartSLOduration=1.06497576 podStartE2EDuration="1.06497576s" podCreationTimestamp="2024-12-13 14:33:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:33:13.02065955 +0000 UTC m=+1.463035923" watchObservedRunningTime="2024-12-13 14:33:13.06497576 +0000 UTC m=+1.507352137" Dec 13 14:33:13.138704 kubelet[2802]: I1213 14:33:13.138643 2802 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-19-209" podStartSLOduration=1.138619748 podStartE2EDuration="1.138619748s" podCreationTimestamp="2024-12-13 14:33:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:33:13.067052077 +0000 UTC m=+1.509428452" watchObservedRunningTime="2024-12-13 14:33:13.138619748 +0000 UTC m=+1.580996118" Dec 13 14:33:13.189655 kubelet[2802]: I1213 14:33:13.189582 2802 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-19-209" podStartSLOduration=1.189529348 podStartE2EDuration="1.189529348s" podCreationTimestamp="2024-12-13 14:33:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:33:13.139809622 +0000 UTC m=+1.582185996" watchObservedRunningTime="2024-12-13 14:33:13.189529348 +0000 UTC m=+1.631905722" Dec 13 14:33:13.945107 amazon-ssm-agent[1708]: 2024-12-13 14:33:13 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Dec 13 14:33:18.256041 sudo[2013]: pam_unix(sudo:session): session closed for user root Dec 13 14:33:18.255000 audit[2013]: USER_END pid=2013 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:33:18.262085 kernel: kauditd_printk_skb: 3 callbacks suppressed Dec 13 14:33:18.262192 kernel: audit: type=1106 audit(1734100398.255:812): pid=2013 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:33:18.255000 audit[2013]: CRED_DISP pid=2013 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:33:18.265752 kernel: audit: type=1104 audit(1734100398.255:813): pid=2013 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:33:18.285101 sshd[2010]: pam_unix(sshd:session): session closed for user core Dec 13 14:33:18.291000 audit[2010]: USER_END pid=2010 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:33:18.296140 systemd[1]: sshd@6-172.31.19.209:22-139.178.89.65:45854.service: Deactivated successfully. Dec 13 14:33:18.297081 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:33:18.300191 systemd[1]: session-7.scope: Consumed 5.045s CPU time. Dec 13 14:33:18.291000 audit[2010]: CRED_DISP pid=2010 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:33:18.302670 systemd-logind[1722]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:33:18.306487 systemd-logind[1722]: Removed session 7. Dec 13 14:33:18.314381 kernel: audit: type=1106 audit(1734100398.291:814): pid=2010 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:33:18.314530 kernel: audit: type=1104 audit(1734100398.291:815): pid=2010 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:33:18.314588 kernel: audit: type=1131 audit(1734100398.296:816): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.19.209:22-139.178.89.65:45854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:18.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.19.209:22-139.178.89.65:45854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:33:23.492000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:33:23.492000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000edb2c0 a2=fc6 a3=0 items=0 ppid=2415 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 key=(null) Dec 13 14:33:23.504337 kernel: audit: type=1400 audit(1734100403.492:817): avc: denied { watch } for pid=2581 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:33:23.504464 kernel: audit: type=1300 audit(1734100403.492:817): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000edb2c0 a2=fc6 a3=0 items=0 ppid=2415 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 key=(null) Dec 13 14:33:23.492000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:23.512382 kernel: audit: type=1327 audit(1734100403.492:817): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:23.610387 kubelet[2802]: I1213 14:33:23.610288 2802 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 14:33:23.611023 env[1734]: time="2024-12-13T14:33:23.610787785Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:33:23.611369 kubelet[2802]: I1213 14:33:23.611125 2802 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 14:33:24.518380 kubelet[2802]: I1213 14:33:24.518323 2802 topology_manager.go:215] "Topology Admit Handler" podUID="68b3b2b0-d0fc-4460-9908-02997c0ae5a5" podNamespace="kube-system" podName="kube-proxy-vfhb7" Dec 13 14:33:24.526480 systemd[1]: Created slice kubepods-besteffort-pod68b3b2b0_d0fc_4460_9908_02997c0ae5a5.slice. Dec 13 14:33:24.581849 kubelet[2802]: I1213 14:33:24.581801 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/68b3b2b0-d0fc-4460-9908-02997c0ae5a5-lib-modules\") pod \"kube-proxy-vfhb7\" (UID: \"68b3b2b0-d0fc-4460-9908-02997c0ae5a5\") " pod="kube-system/kube-proxy-vfhb7" Dec 13 14:33:24.581849 kubelet[2802]: I1213 14:33:24.581847 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/68b3b2b0-d0fc-4460-9908-02997c0ae5a5-xtables-lock\") pod \"kube-proxy-vfhb7\" (UID: \"68b3b2b0-d0fc-4460-9908-02997c0ae5a5\") " pod="kube-system/kube-proxy-vfhb7" Dec 13 14:33:24.582073 kubelet[2802]: I1213 14:33:24.581878 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s9zz4\" (UniqueName: \"kubernetes.io/projected/68b3b2b0-d0fc-4460-9908-02997c0ae5a5-kube-api-access-s9zz4\") pod \"kube-proxy-vfhb7\" (UID: \"68b3b2b0-d0fc-4460-9908-02997c0ae5a5\") " pod="kube-system/kube-proxy-vfhb7" Dec 13 14:33:24.582073 kubelet[2802]: I1213 14:33:24.581905 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/68b3b2b0-d0fc-4460-9908-02997c0ae5a5-kube-proxy\") pod \"kube-proxy-vfhb7\" (UID: \"68b3b2b0-d0fc-4460-9908-02997c0ae5a5\") " pod="kube-system/kube-proxy-vfhb7" Dec 13 14:33:24.835935 env[1734]: time="2024-12-13T14:33:24.835408733Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vfhb7,Uid:68b3b2b0-d0fc-4460-9908-02997c0ae5a5,Namespace:kube-system,Attempt:0,}" Dec 13 14:33:24.838888 kubelet[2802]: I1213 14:33:24.838834 2802 topology_manager.go:215] "Topology Admit Handler" podUID="196a69bd-a102-443b-95f4-ca46992469d4" podNamespace="tigera-operator" podName="tigera-operator-7bc55997bb-hkv8w" Dec 13 14:33:24.849808 systemd[1]: Created slice kubepods-besteffort-pod196a69bd_a102_443b_95f4_ca46992469d4.slice. Dec 13 14:33:24.880465 env[1734]: time="2024-12-13T14:33:24.880320114Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:33:24.880698 env[1734]: time="2024-12-13T14:33:24.880665826Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:33:24.881756 env[1734]: time="2024-12-13T14:33:24.881719610Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:33:24.886690 env[1734]: time="2024-12-13T14:33:24.886623557Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1d30e9b324a4218e8b8fe9356f53dd86aeb44bda08d41b622f34273eee421b2d pid=2883 runtime=io.containerd.runc.v2 Dec 13 14:33:24.926996 kubelet[2802]: I1213 14:33:24.926958 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/196a69bd-a102-443b-95f4-ca46992469d4-var-lib-calico\") pod \"tigera-operator-7bc55997bb-hkv8w\" (UID: \"196a69bd-a102-443b-95f4-ca46992469d4\") " pod="tigera-operator/tigera-operator-7bc55997bb-hkv8w" Dec 13 14:33:24.937488 kubelet[2802]: I1213 14:33:24.937447 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2kfq5\" (UniqueName: \"kubernetes.io/projected/196a69bd-a102-443b-95f4-ca46992469d4-kube-api-access-2kfq5\") pod \"tigera-operator-7bc55997bb-hkv8w\" (UID: \"196a69bd-a102-443b-95f4-ca46992469d4\") " pod="tigera-operator/tigera-operator-7bc55997bb-hkv8w" Dec 13 14:33:24.945270 systemd[1]: Started cri-containerd-1d30e9b324a4218e8b8fe9356f53dd86aeb44bda08d41b622f34273eee421b2d.scope. Dec 13 14:33:24.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.990997 kernel: audit: type=1400 audit(1734100404.983:818): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.991263 kernel: audit: type=1400 audit(1734100404.983:819): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.991297 kernel: audit: type=1400 audit(1734100404.983:820): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.998560 kernel: audit: type=1400 audit(1734100404.983:821): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.006502 kernel: audit: type=1400 audit(1734100404.983:822): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.006645 kernel: audit: type=1400 audit(1734100404.983:823): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.013436 kernel: audit: type=1400 audit(1734100404.983:824): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.990000 audit: BPF prog-id=103 op=LOAD Dec 13 14:33:24.993000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.993000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2883 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:24.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164333065396233323461343231386538623866653933353666353364 Dec 13 14:33:24.993000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.993000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2883 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:24.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164333065396233323461343231386538623866653933353666353364 Dec 13 14:33:24.993000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.993000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.993000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.993000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.993000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.993000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.993000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.993000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.993000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.993000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.993000 audit: BPF prog-id=104 op=LOAD Dec 13 14:33:24.993000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000349be0 items=0 ppid=2883 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:24.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164333065396233323461343231386538623866653933353666353364 Dec 13 14:33:24.994000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.994000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.994000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.994000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.994000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.994000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.994000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.994000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.994000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.994000 audit: BPF prog-id=105 op=LOAD Dec 13 14:33:24.994000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000349c28 items=0 ppid=2883 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:24.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164333065396233323461343231386538623866653933353666353364 Dec 13 14:33:24.994000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:33:24.994000 audit: BPF prog-id=104 op=UNLOAD Dec 13 14:33:24.994000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.994000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.994000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.994000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.994000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.994000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.994000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.994000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.994000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.994000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:24.994000 audit: BPF prog-id=106 op=LOAD Dec 13 14:33:24.994000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003c0038 items=0 ppid=2883 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:24.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164333065396233323461343231386538623866653933353666353364 Dec 13 14:33:25.031851 env[1734]: time="2024-12-13T14:33:25.031804817Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vfhb7,Uid:68b3b2b0-d0fc-4460-9908-02997c0ae5a5,Namespace:kube-system,Attempt:0,} returns sandbox id \"1d30e9b324a4218e8b8fe9356f53dd86aeb44bda08d41b622f34273eee421b2d\"" Dec 13 14:33:25.036288 env[1734]: time="2024-12-13T14:33:25.036210516Z" level=info msg="CreateContainer within sandbox \"1d30e9b324a4218e8b8fe9356f53dd86aeb44bda08d41b622f34273eee421b2d\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:33:25.096711 env[1734]: time="2024-12-13T14:33:25.096612722Z" level=info msg="CreateContainer within sandbox \"1d30e9b324a4218e8b8fe9356f53dd86aeb44bda08d41b622f34273eee421b2d\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"57c45f7053a65ed8a4cae70849234a089c4320c84cf89742e4e1970a764fabe4\"" Dec 13 14:33:25.097780 env[1734]: time="2024-12-13T14:33:25.097753939Z" level=info msg="StartContainer for \"57c45f7053a65ed8a4cae70849234a089c4320c84cf89742e4e1970a764fabe4\"" Dec 13 14:33:25.118375 systemd[1]: Started cri-containerd-57c45f7053a65ed8a4cae70849234a089c4320c84cf89742e4e1970a764fabe4.scope. Dec 13 14:33:25.140000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.140000 audit[2923]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f1ec9ec0bb8 items=0 ppid=2883 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:25.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537633435663730353361363565643861346361653730383439323334 Dec 13 14:33:25.141000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.141000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.141000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.141000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.141000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.141000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.141000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.141000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.141000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.141000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.141000 audit: BPF prog-id=107 op=LOAD Dec 13 14:33:25.141000 audit[2923]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002efc58 items=0 ppid=2883 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:25.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537633435663730353361363565643861346361653730383439323334 Dec 13 14:33:25.142000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.142000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.142000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.142000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.142000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.142000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.142000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.142000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.142000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.142000 audit: BPF prog-id=108 op=LOAD Dec 13 14:33:25.142000 audit[2923]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002efca8 items=0 ppid=2883 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:25.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537633435663730353361363565643861346361653730383439323334 Dec 13 14:33:25.142000 audit: BPF prog-id=108 op=UNLOAD Dec 13 14:33:25.142000 audit: BPF prog-id=107 op=UNLOAD Dec 13 14:33:25.142000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.142000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.142000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.142000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.142000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.142000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.142000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.142000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.142000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.142000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.142000 audit: BPF prog-id=109 op=LOAD Dec 13 14:33:25.142000 audit[2923]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002efd38 items=0 ppid=2883 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:25.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537633435663730353361363565643861346361653730383439323334 Dec 13 14:33:25.174316 env[1734]: time="2024-12-13T14:33:25.174264228Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-hkv8w,Uid:196a69bd-a102-443b-95f4-ca46992469d4,Namespace:tigera-operator,Attempt:0,}" Dec 13 14:33:25.175126 env[1734]: time="2024-12-13T14:33:25.175060894Z" level=info msg="StartContainer for \"57c45f7053a65ed8a4cae70849234a089c4320c84cf89742e4e1970a764fabe4\" returns successfully" Dec 13 14:33:25.205689 env[1734]: time="2024-12-13T14:33:25.205607376Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:33:25.205884 env[1734]: time="2024-12-13T14:33:25.205862943Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:33:25.205984 env[1734]: time="2024-12-13T14:33:25.205967203Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:33:25.206491 env[1734]: time="2024-12-13T14:33:25.206378015Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e3b17823f83755ea400541e5e31ec15213b6a17c1d81c85e45d8ccde3bcf8637 pid=2953 runtime=io.containerd.runc.v2 Dec 13 14:33:25.223202 systemd[1]: Started cri-containerd-e3b17823f83755ea400541e5e31ec15213b6a17c1d81c85e45d8ccde3bcf8637.scope. Dec 13 14:33:25.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.239000 audit: BPF prog-id=110 op=LOAD Dec 13 14:33:25.240000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.240000 audit[2965]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2953 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:25.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533623137383233663833373535656134303035343165356533316563 Dec 13 14:33:25.241000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.241000 audit[2965]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2953 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:25.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533623137383233663833373535656134303035343165356533316563 Dec 13 14:33:25.241000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.241000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.241000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.241000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.241000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.241000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.241000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.241000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.241000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.241000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.241000 audit: BPF prog-id=111 op=LOAD Dec 13 14:33:25.241000 audit[2965]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003b6030 items=0 ppid=2953 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:25.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533623137383233663833373535656134303035343165356533316563 Dec 13 14:33:25.241000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.241000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.241000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.241000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.241000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.241000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.241000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.241000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.241000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.241000 audit: BPF prog-id=112 op=LOAD Dec 13 14:33:25.241000 audit[2965]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003b6078 items=0 ppid=2953 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:25.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533623137383233663833373535656134303035343165356533316563 Dec 13 14:33:25.241000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:33:25.242000 audit: BPF prog-id=111 op=UNLOAD Dec 13 14:33:25.242000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.242000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.242000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.242000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.242000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.242000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.242000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.242000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.242000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.242000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:25.242000 audit: BPF prog-id=113 op=LOAD Dec 13 14:33:25.242000 audit[2965]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003b6488 items=0 ppid=2953 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:25.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533623137383233663833373535656134303035343165356533316563 Dec 13 14:33:25.291377 env[1734]: time="2024-12-13T14:33:25.291255873Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-hkv8w,Uid:196a69bd-a102-443b-95f4-ca46992469d4,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"e3b17823f83755ea400541e5e31ec15213b6a17c1d81c85e45d8ccde3bcf8637\"" Dec 13 14:33:25.303670 env[1734]: time="2024-12-13T14:33:25.303636292Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 14:33:25.735758 systemd[1]: run-containerd-runc-k8s.io-1d30e9b324a4218e8b8fe9356f53dd86aeb44bda08d41b622f34273eee421b2d-runc.7KA8tM.mount: Deactivated successfully. Dec 13 14:33:25.835000 audit[3016]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=3016 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:25.835000 audit[3016]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd35df230 a2=0 a3=7fffd35df21c items=0 ppid=2933 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:25.835000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:33:25.839000 audit[3017]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=3017 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:25.839000 audit[3017]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec33aa260 a2=0 a3=7ffec33aa24c items=0 ppid=2933 pid=3017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:25.839000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:33:25.841000 audit[3018]: NETFILTER_CFG table=mangle:40 family=10 entries=1 op=nft_register_chain pid=3018 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:25.841000 audit[3018]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc23657400 a2=0 a3=7ffc236573ec items=0 ppid=2933 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:25.841000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:33:25.842000 audit[3019]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=3019 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:25.842000 audit[3019]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1fb18b40 a2=0 a3=7fff1fb18b2c items=0 ppid=2933 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:25.842000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:33:25.843000 audit[3020]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=3020 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:25.843000 audit[3020]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdfcc88680 a2=0 a3=7ffdfcc8866c items=0 ppid=2933 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:25.843000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:33:25.845000 audit[3021]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=3021 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:25.845000 audit[3021]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff014ac750 a2=0 a3=7fff014ac73c items=0 ppid=2933 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:25.845000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:33:25.962000 audit[3022]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=3022 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:25.962000 audit[3022]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffd8e1dd80 a2=0 a3=7fffd8e1dd6c items=0 ppid=2933 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:25.962000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:33:25.967000 audit[3024]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=3024 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:25.967000 audit[3024]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffd4d63ca0 a2=0 a3=7fffd4d63c8c items=0 ppid=2933 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:25.967000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:33:25.972000 audit[3027]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=3027 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:25.972000 audit[3027]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd90ea2d50 a2=0 a3=7ffd90ea2d3c items=0 ppid=2933 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:25.972000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:33:25.974000 audit[3028]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=3028 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:25.974000 audit[3028]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeddbdc6b0 a2=0 a3=7ffeddbdc69c items=0 ppid=2933 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:25.974000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:33:25.976000 audit[3030]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=3030 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:25.976000 audit[3030]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc23a6200 a2=0 a3=7ffcc23a61ec items=0 ppid=2933 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:25.976000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:33:25.978000 audit[3031]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=3031 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:25.978000 audit[3031]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd4fe5b80 a2=0 a3=7fffd4fe5b6c items=0 ppid=2933 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:25.978000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:33:25.983000 audit[3033]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=3033 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:25.983000 audit[3033]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff629c8290 a2=0 a3=7fff629c827c items=0 ppid=2933 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:25.983000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:33:25.988000 audit[3036]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=3036 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:25.988000 audit[3036]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffa30861e0 a2=0 a3=7fffa30861cc items=0 ppid=2933 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:25.988000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:33:25.993000 audit[3037]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=3037 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:25.993000 audit[3037]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe76b6b5c0 a2=0 a3=7ffe76b6b5ac items=0 ppid=2933 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:25.993000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:33:26.001000 audit[3039]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=3039 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:26.001000 audit[3039]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe5650c2e0 a2=0 a3=7ffe5650c2cc items=0 ppid=2933 pid=3039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.001000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:33:26.004000 audit[3040]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=3040 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:26.004000 audit[3040]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1d9e6bc0 a2=0 a3=7fff1d9e6bac items=0 ppid=2933 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.004000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:33:26.011000 audit[3042]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=3042 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:26.011000 audit[3042]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe44462c00 a2=0 a3=7ffe44462bec items=0 ppid=2933 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.011000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:33:26.021000 audit[3045]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3045 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:26.021000 audit[3045]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe0ee29fd0 a2=0 a3=7ffe0ee29fbc items=0 ppid=2933 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.021000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:33:26.028000 audit[3048]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3048 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:26.028000 audit[3048]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffefa0b95b0 a2=0 a3=7ffefa0b959c items=0 ppid=2933 pid=3048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.028000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:33:26.031000 audit[3049]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3049 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:26.031000 audit[3049]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc9e495650 a2=0 a3=7ffc9e49563c items=0 ppid=2933 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.031000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:33:26.035000 audit[3051]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3051 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:26.035000 audit[3051]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe6cf8a200 a2=0 a3=7ffe6cf8a1ec items=0 ppid=2933 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.035000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:33:26.041000 audit[3054]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3054 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:26.041000 audit[3054]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdc420c2e0 a2=0 a3=7ffdc420c2cc items=0 ppid=2933 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.041000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:33:26.043000 audit[3055]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3055 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:26.043000 audit[3055]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6f6c3ab0 a2=0 a3=7ffd6f6c3a9c items=0 ppid=2933 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.043000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:33:26.046000 audit[3057]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3057 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:33:26.046000 audit[3057]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffc4a5e8f40 a2=0 a3=7ffc4a5e8f2c items=0 ppid=2933 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.046000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:33:26.077000 audit[3063]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3063 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:26.077000 audit[3063]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffe1588d750 a2=0 a3=7ffe1588d73c items=0 ppid=2933 pid=3063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.077000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:26.088000 audit[3063]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3063 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:26.088000 audit[3063]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffe1588d750 a2=0 a3=7ffe1588d73c items=0 ppid=2933 pid=3063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.088000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:26.090000 audit[3068]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3068 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:26.090000 audit[3068]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffee0d98720 a2=0 a3=7ffee0d9870c items=0 ppid=2933 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.090000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:33:26.094000 audit[3070]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3070 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:26.094000 audit[3070]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc14481710 a2=0 a3=7ffc144816fc items=0 ppid=2933 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.094000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:33:26.100000 audit[3073]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3073 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:26.100000 audit[3073]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd105c2b70 a2=0 a3=7ffd105c2b5c items=0 ppid=2933 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.100000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:33:26.102000 audit[3074]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3074 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:26.102000 audit[3074]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0a61cf10 a2=0 a3=7fff0a61cefc items=0 ppid=2933 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.102000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:33:26.105000 audit[3076]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3076 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:26.105000 audit[3076]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc77d17740 a2=0 a3=7ffc77d1772c items=0 ppid=2933 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.105000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:33:26.106000 audit[3077]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3077 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:26.106000 audit[3077]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5e2f1620 a2=0 a3=7fff5e2f160c items=0 ppid=2933 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.106000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:33:26.109000 audit[3079]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3079 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:26.109000 audit[3079]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc84bfdb00 a2=0 a3=7ffc84bfdaec items=0 ppid=2933 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.109000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:33:26.114000 audit[3082]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3082 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:26.114000 audit[3082]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffde337a2b0 a2=0 a3=7ffde337a29c items=0 ppid=2933 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:33:26.116000 audit[3083]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3083 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:26.116000 audit[3083]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe14e0f990 a2=0 a3=7ffe14e0f97c items=0 ppid=2933 pid=3083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.116000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:33:26.119000 audit[3085]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3085 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:26.119000 audit[3085]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffdac37130 a2=0 a3=7fffdac3711c items=0 ppid=2933 pid=3085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.119000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:33:26.120000 audit[3086]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3086 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:26.120000 audit[3086]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed4addf30 a2=0 a3=7ffed4addf1c items=0 ppid=2933 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.120000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:33:26.123000 audit[3088]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3088 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:26.123000 audit[3088]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffee95fd1e0 a2=0 a3=7ffee95fd1cc items=0 ppid=2933 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.123000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:33:26.129000 audit[3091]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3091 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:26.129000 audit[3091]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf7700720 a2=0 a3=7ffdf770070c items=0 ppid=2933 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.129000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:33:26.135000 audit[3094]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3094 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:26.135000 audit[3094]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc61602370 a2=0 a3=7ffc6160235c items=0 ppid=2933 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.135000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:33:26.136000 audit[3095]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3095 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:26.136000 audit[3095]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdde1e2b10 a2=0 a3=7ffdde1e2afc items=0 ppid=2933 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.136000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:33:26.139000 audit[3097]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3097 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:26.139000 audit[3097]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc644983f0 a2=0 a3=7ffc644983dc items=0 ppid=2933 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.139000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:33:26.144000 audit[3100]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3100 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:26.144000 audit[3100]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd2a7c9f80 a2=0 a3=7ffd2a7c9f6c items=0 ppid=2933 pid=3100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.144000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:33:26.145000 audit[3101]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3101 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:26.145000 audit[3101]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca8b81bb0 a2=0 a3=7ffca8b81b9c items=0 ppid=2933 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.145000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:33:26.150000 audit[3103]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3103 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:26.150000 audit[3103]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdab5129b0 a2=0 a3=7ffdab51299c items=0 ppid=2933 pid=3103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.150000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:33:26.151000 audit[3104]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3104 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:26.151000 audit[3104]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1ff92aa0 a2=0 a3=7ffe1ff92a8c items=0 ppid=2933 pid=3104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.151000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:33:26.154000 audit[3106]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3106 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:26.154000 audit[3106]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdd6d98ab0 a2=0 a3=7ffdd6d98a9c items=0 ppid=2933 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.154000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:33:26.163000 audit[3109]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3109 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:33:26.163000 audit[3109]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd357a89c0 a2=0 a3=7ffd357a89ac items=0 ppid=2933 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.163000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:33:26.169000 audit[3111]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3111 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:33:26.169000 audit[3111]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7fff384a3a30 a2=0 a3=7fff384a3a1c items=0 ppid=2933 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.169000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:26.170000 audit[3111]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3111 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:33:26.170000 audit[3111]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff384a3a30 a2=0 a3=7fff384a3a1c items=0 ppid=2933 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:26.170000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:27.380372 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2325024976.mount: Deactivated successfully. Dec 13 14:33:28.341197 env[1734]: time="2024-12-13T14:33:28.341137204Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:28.347036 env[1734]: time="2024-12-13T14:33:28.346581119Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:28.350377 env[1734]: time="2024-12-13T14:33:28.350270958Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:28.352707 env[1734]: time="2024-12-13T14:33:28.352667104Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:28.353314 env[1734]: time="2024-12-13T14:33:28.353268498Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 14:33:28.360594 env[1734]: time="2024-12-13T14:33:28.360550783Z" level=info msg="CreateContainer within sandbox \"e3b17823f83755ea400541e5e31ec15213b6a17c1d81c85e45d8ccde3bcf8637\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 14:33:28.379498 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1928701579.mount: Deactivated successfully. Dec 13 14:33:28.400426 env[1734]: time="2024-12-13T14:33:28.400376651Z" level=info msg="CreateContainer within sandbox \"e3b17823f83755ea400541e5e31ec15213b6a17c1d81c85e45d8ccde3bcf8637\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"17772cfd40a05b2cad69bc405ce5ea13164d78e0d15cdde7846ca27b52e1ef7e\"" Dec 13 14:33:28.403387 env[1734]: time="2024-12-13T14:33:28.401022281Z" level=info msg="StartContainer for \"17772cfd40a05b2cad69bc405ce5ea13164d78e0d15cdde7846ca27b52e1ef7e\"" Dec 13 14:33:28.434446 systemd[1]: Started cri-containerd-17772cfd40a05b2cad69bc405ce5ea13164d78e0d15cdde7846ca27b52e1ef7e.scope. Dec 13 14:33:28.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.468000 audit: BPF prog-id=114 op=LOAD Dec 13 14:33:28.469000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.469000 audit[3120]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2953 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:28.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137373732636664343061303562326361643639626334303563653565 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit[3120]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2953 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:28.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137373732636664343061303562326361643639626334303563653565 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit: BPF prog-id=115 op=LOAD Dec 13 14:33:28.470000 audit[3120]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000324670 items=0 ppid=2953 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:28.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137373732636664343061303562326361643639626334303563653565 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit: BPF prog-id=116 op=LOAD Dec 13 14:33:28.470000 audit[3120]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003246b8 items=0 ppid=2953 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:28.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137373732636664343061303562326361643639626334303563653565 Dec 13 14:33:28.470000 audit: BPF prog-id=116 op=UNLOAD Dec 13 14:33:28.470000 audit: BPF prog-id=115 op=UNLOAD Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:28.470000 audit: BPF prog-id=117 op=LOAD Dec 13 14:33:28.470000 audit[3120]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000324ac8 items=0 ppid=2953 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:28.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137373732636664343061303562326361643639626334303563653565 Dec 13 14:33:28.510773 env[1734]: time="2024-12-13T14:33:28.510706006Z" level=info msg="StartContainer for \"17772cfd40a05b2cad69bc405ce5ea13164d78e0d15cdde7846ca27b52e1ef7e\" returns successfully" Dec 13 14:33:29.013480 kubelet[2802]: I1213 14:33:29.013415 2802 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-vfhb7" podStartSLOduration=5.013391402 podStartE2EDuration="5.013391402s" podCreationTimestamp="2024-12-13 14:33:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:33:26.008565369 +0000 UTC m=+14.450941756" watchObservedRunningTime="2024-12-13 14:33:29.013391402 +0000 UTC m=+17.455767778" Dec 13 14:33:31.915000 audit[3151]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3151 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:31.918333 kernel: kauditd_printk_skb: 360 callbacks suppressed Dec 13 14:33:31.918453 kernel: audit: type=1325 audit(1734100411.915:929): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3151 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:31.915000 audit[3151]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe58b1be90 a2=0 a3=7ffe58b1be7c items=0 ppid=2933 pid=3151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:31.915000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:31.974255 kernel: audit: type=1300 audit(1734100411.915:929): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe58b1be90 a2=0 a3=7ffe58b1be7c items=0 ppid=2933 pid=3151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:31.974447 kernel: audit: type=1327 audit(1734100411.915:929): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:31.976000 audit[3151]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3151 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:31.980389 kernel: audit: type=1325 audit(1734100411.976:930): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3151 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:31.987339 kubelet[2802]: I1213 14:33:31.987236 2802 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7bc55997bb-hkv8w" podStartSLOduration=4.922402051 podStartE2EDuration="7.987214494s" podCreationTimestamp="2024-12-13 14:33:24 +0000 UTC" firstStartedPulling="2024-12-13 14:33:25.29296013 +0000 UTC m=+13.735336486" lastFinishedPulling="2024-12-13 14:33:28.357772558 +0000 UTC m=+16.800148929" observedRunningTime="2024-12-13 14:33:29.014692023 +0000 UTC m=+17.457068399" watchObservedRunningTime="2024-12-13 14:33:31.987214494 +0000 UTC m=+20.429590873" Dec 13 14:33:31.976000 audit[3151]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe58b1be90 a2=0 a3=0 items=0 ppid=2933 pid=3151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:31.998374 kernel: audit: type=1300 audit(1734100411.976:930): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe58b1be90 a2=0 a3=0 items=0 ppid=2933 pid=3151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:31.998512 kernel: audit: type=1327 audit(1734100411.976:930): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:31.976000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:32.143921 kubelet[2802]: I1213 14:33:32.143862 2802 topology_manager.go:215] "Topology Admit Handler" podUID="c42d8654-1498-4287-aa04-3add6f08431a" podNamespace="calico-system" podName="calico-typha-76998b76cf-nn94m" Dec 13 14:33:32.172120 systemd[1]: Created slice kubepods-besteffort-podc42d8654_1498_4287_aa04_3add6f08431a.slice. Dec 13 14:33:32.234000 audit[3154]: NETFILTER_CFG table=filter:91 family=2 entries=17 op=nft_register_rule pid=3154 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:32.238627 kernel: audit: type=1325 audit(1734100412.234:931): table=filter:91 family=2 entries=17 op=nft_register_rule pid=3154 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:32.234000 audit[3154]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffcc6e03810 a2=0 a3=7ffcc6e037fc items=0 ppid=2933 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.262405 kernel: audit: type=1300 audit(1734100412.234:931): arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffcc6e03810 a2=0 a3=7ffcc6e037fc items=0 ppid=2933 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.234000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:32.266423 kernel: audit: type=1327 audit(1734100412.234:931): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:32.276000 audit[3154]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3154 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:32.279387 kernel: audit: type=1325 audit(1734100412.276:932): table=nat:92 family=2 entries=12 op=nft_register_rule pid=3154 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:32.276000 audit[3154]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcc6e03810 a2=0 a3=0 items=0 ppid=2933 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.276000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:32.314483 kubelet[2802]: I1213 14:33:32.314437 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c42d8654-1498-4287-aa04-3add6f08431a-tigera-ca-bundle\") pod \"calico-typha-76998b76cf-nn94m\" (UID: \"c42d8654-1498-4287-aa04-3add6f08431a\") " pod="calico-system/calico-typha-76998b76cf-nn94m" Dec 13 14:33:32.314483 kubelet[2802]: I1213 14:33:32.314493 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/c42d8654-1498-4287-aa04-3add6f08431a-typha-certs\") pod \"calico-typha-76998b76cf-nn94m\" (UID: \"c42d8654-1498-4287-aa04-3add6f08431a\") " pod="calico-system/calico-typha-76998b76cf-nn94m" Dec 13 14:33:32.314926 kubelet[2802]: I1213 14:33:32.314584 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5bph2\" (UniqueName: \"kubernetes.io/projected/c42d8654-1498-4287-aa04-3add6f08431a-kube-api-access-5bph2\") pod \"calico-typha-76998b76cf-nn94m\" (UID: \"c42d8654-1498-4287-aa04-3add6f08431a\") " pod="calico-system/calico-typha-76998b76cf-nn94m" Dec 13 14:33:32.484768 kubelet[2802]: I1213 14:33:32.484643 2802 topology_manager.go:215] "Topology Admit Handler" podUID="1c0621a5-7914-4217-8122-6cd6b43c05c8" podNamespace="calico-system" podName="calico-node-p2thv" Dec 13 14:33:32.488579 env[1734]: time="2024-12-13T14:33:32.488535832Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-76998b76cf-nn94m,Uid:c42d8654-1498-4287-aa04-3add6f08431a,Namespace:calico-system,Attempt:0,}" Dec 13 14:33:32.529944 systemd[1]: Created slice kubepods-besteffort-pod1c0621a5_7914_4217_8122_6cd6b43c05c8.slice. Dec 13 14:33:32.545738 kubelet[2802]: I1213 14:33:32.545706 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-xtables-lock\") pod \"calico-node-p2thv\" (UID: \"1c0621a5-7914-4217-8122-6cd6b43c05c8\") " pod="calico-system/calico-node-p2thv" Dec 13 14:33:32.546027 kubelet[2802]: I1213 14:33:32.545951 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1c0621a5-7914-4217-8122-6cd6b43c05c8-node-certs\") pod \"calico-node-p2thv\" (UID: \"1c0621a5-7914-4217-8122-6cd6b43c05c8\") " pod="calico-system/calico-node-p2thv" Dec 13 14:33:32.546199 kubelet[2802]: I1213 14:33:32.546172 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-cni-bin-dir\") pod \"calico-node-p2thv\" (UID: \"1c0621a5-7914-4217-8122-6cd6b43c05c8\") " pod="calico-system/calico-node-p2thv" Dec 13 14:33:32.546521 kubelet[2802]: I1213 14:33:32.546404 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-cni-log-dir\") pod \"calico-node-p2thv\" (UID: \"1c0621a5-7914-4217-8122-6cd6b43c05c8\") " pod="calico-system/calico-node-p2thv" Dec 13 14:33:32.546679 kubelet[2802]: I1213 14:33:32.546661 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-lib-modules\") pod \"calico-node-p2thv\" (UID: \"1c0621a5-7914-4217-8122-6cd6b43c05c8\") " pod="calico-system/calico-node-p2thv" Dec 13 14:33:32.546940 kubelet[2802]: I1213 14:33:32.546809 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-var-run-calico\") pod \"calico-node-p2thv\" (UID: \"1c0621a5-7914-4217-8122-6cd6b43c05c8\") " pod="calico-system/calico-node-p2thv" Dec 13 14:33:32.547322 kubelet[2802]: I1213 14:33:32.547285 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5rrpx\" (UniqueName: \"kubernetes.io/projected/1c0621a5-7914-4217-8122-6cd6b43c05c8-kube-api-access-5rrpx\") pod \"calico-node-p2thv\" (UID: \"1c0621a5-7914-4217-8122-6cd6b43c05c8\") " pod="calico-system/calico-node-p2thv" Dec 13 14:33:32.547553 kubelet[2802]: I1213 14:33:32.547476 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1c0621a5-7914-4217-8122-6cd6b43c05c8-tigera-ca-bundle\") pod \"calico-node-p2thv\" (UID: \"1c0621a5-7914-4217-8122-6cd6b43c05c8\") " pod="calico-system/calico-node-p2thv" Dec 13 14:33:32.547654 env[1734]: time="2024-12-13T14:33:32.547572596Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:33:32.547732 env[1734]: time="2024-12-13T14:33:32.547700414Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:33:32.547873 env[1734]: time="2024-12-13T14:33:32.547738073Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:33:32.548032 env[1734]: time="2024-12-13T14:33:32.547991724Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/136af3ff9b47286354bc2ff4b3a5eff73d95718e1856bbf3f260d78fa5a7ee4a pid=3163 runtime=io.containerd.runc.v2 Dec 13 14:33:32.548139 kubelet[2802]: I1213 14:33:32.548001 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-var-lib-calico\") pod \"calico-node-p2thv\" (UID: \"1c0621a5-7914-4217-8122-6cd6b43c05c8\") " pod="calico-system/calico-node-p2thv" Dec 13 14:33:32.548288 kubelet[2802]: I1213 14:33:32.548271 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-cni-net-dir\") pod \"calico-node-p2thv\" (UID: \"1c0621a5-7914-4217-8122-6cd6b43c05c8\") " pod="calico-system/calico-node-p2thv" Dec 13 14:33:32.548496 kubelet[2802]: I1213 14:33:32.548479 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-policysync\") pod \"calico-node-p2thv\" (UID: \"1c0621a5-7914-4217-8122-6cd6b43c05c8\") " pod="calico-system/calico-node-p2thv" Dec 13 14:33:32.548789 kubelet[2802]: I1213 14:33:32.548759 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-flexvol-driver-host\") pod \"calico-node-p2thv\" (UID: \"1c0621a5-7914-4217-8122-6cd6b43c05c8\") " pod="calico-system/calico-node-p2thv" Dec 13 14:33:32.590252 systemd[1]: Started cri-containerd-136af3ff9b47286354bc2ff4b3a5eff73d95718e1856bbf3f260d78fa5a7ee4a.scope. Dec 13 14:33:32.675414 kubelet[2802]: E1213 14:33:32.675381 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.675717 kubelet[2802]: W1213 14:33:32.675696 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.675945 kubelet[2802]: E1213 14:33:32.675929 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.676389 kubelet[2802]: E1213 14:33:32.676338 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.676389 kubelet[2802]: W1213 14:33:32.676380 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.676561 kubelet[2802]: E1213 14:33:32.676398 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.676689 kubelet[2802]: E1213 14:33:32.676646 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.676689 kubelet[2802]: W1213 14:33:32.676657 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.676689 kubelet[2802]: E1213 14:33:32.676671 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.676909 kubelet[2802]: E1213 14:33:32.676895 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.676990 kubelet[2802]: W1213 14:33:32.676911 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.676990 kubelet[2802]: E1213 14:33:32.676923 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.677121 kubelet[2802]: E1213 14:33:32.677108 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.677185 kubelet[2802]: W1213 14:33:32.677123 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.677185 kubelet[2802]: E1213 14:33:32.677135 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.677538 kubelet[2802]: E1213 14:33:32.677521 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.677538 kubelet[2802]: W1213 14:33:32.677539 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.677760 kubelet[2802]: E1213 14:33:32.677566 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.677814 kubelet[2802]: E1213 14:33:32.677775 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.677814 kubelet[2802]: W1213 14:33:32.677785 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.677814 kubelet[2802]: E1213 14:33:32.677798 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.677984 kubelet[2802]: E1213 14:33:32.677973 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.678064 kubelet[2802]: W1213 14:33:32.678053 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.678387 kubelet[2802]: E1213 14:33:32.678323 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.678980 kubelet[2802]: E1213 14:33:32.678956 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.679162 kubelet[2802]: W1213 14:33:32.679145 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.679847 kubelet[2802]: E1213 14:33:32.679828 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.685597 kubelet[2802]: E1213 14:33:32.685568 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.685796 kubelet[2802]: W1213 14:33:32.685774 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.686827 kubelet[2802]: I1213 14:33:32.686794 2802 topology_manager.go:215] "Topology Admit Handler" podUID="21bac09b-9db9-4cf7-814e-0d0853580069" podNamespace="calico-system" podName="csi-node-driver-x2vwj" Dec 13 14:33:32.687200 kubelet[2802]: E1213 14:33:32.687161 2802 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x2vwj" podUID="21bac09b-9db9-4cf7-814e-0d0853580069" Dec 13 14:33:32.687517 kubelet[2802]: E1213 14:33:32.687500 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.687757 kubelet[2802]: E1213 14:33:32.687744 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.687854 kubelet[2802]: W1213 14:33:32.687841 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.687952 kubelet[2802]: E1213 14:33:32.687940 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.690628 kubelet[2802]: E1213 14:33:32.690610 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.692870 kubelet[2802]: W1213 14:33:32.690719 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.692870 kubelet[2802]: E1213 14:33:32.690861 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.692870 kubelet[2802]: E1213 14:33:32.690963 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.692870 kubelet[2802]: W1213 14:33:32.690972 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.692870 kubelet[2802]: E1213 14:33:32.690983 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.692870 kubelet[2802]: E1213 14:33:32.692271 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.692870 kubelet[2802]: W1213 14:33:32.692282 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.692870 kubelet[2802]: E1213 14:33:32.692294 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.719000 audit: BPF prog-id=118 op=LOAD Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3163 pid=3171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133366166336666396234373238363335346263326666346233613565 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3163 pid=3171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133366166336666396234373238363335346263326666346233613565 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit: BPF prog-id=119 op=LOAD Dec 13 14:33:32.723000 audit[3171]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00019ad50 items=0 ppid=3163 pid=3171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133366166336666396234373238363335346263326666346233613565 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit: BPF prog-id=120 op=LOAD Dec 13 14:33:32.723000 audit[3171]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00019ad98 items=0 ppid=3163 pid=3171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133366166336666396234373238363335346263326666346233613565 Dec 13 14:33:32.723000 audit: BPF prog-id=120 op=UNLOAD Dec 13 14:33:32.723000 audit: BPF prog-id=119 op=UNLOAD Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.723000 audit: BPF prog-id=121 op=LOAD Dec 13 14:33:32.723000 audit[3171]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00019b1a8 items=0 ppid=3163 pid=3171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:32.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133366166336666396234373238363335346263326666346233613565 Dec 13 14:33:32.734949 kubelet[2802]: E1213 14:33:32.734853 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.735225 kubelet[2802]: W1213 14:33:32.735205 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.735463 kubelet[2802]: E1213 14:33:32.735431 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.749086 kubelet[2802]: E1213 14:33:32.749020 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.749086 kubelet[2802]: W1213 14:33:32.749087 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.751672 kubelet[2802]: E1213 14:33:32.749114 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.751672 kubelet[2802]: E1213 14:33:32.750131 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.751672 kubelet[2802]: W1213 14:33:32.750148 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.751672 kubelet[2802]: E1213 14:33:32.750167 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.751672 kubelet[2802]: E1213 14:33:32.750598 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.751672 kubelet[2802]: W1213 14:33:32.750611 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.751672 kubelet[2802]: E1213 14:33:32.750632 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.751672 kubelet[2802]: E1213 14:33:32.750932 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.751672 kubelet[2802]: W1213 14:33:32.750942 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.751672 kubelet[2802]: E1213 14:33:32.750956 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.755007 kubelet[2802]: E1213 14:33:32.751193 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.755007 kubelet[2802]: W1213 14:33:32.751203 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.755007 kubelet[2802]: E1213 14:33:32.751217 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.755007 kubelet[2802]: E1213 14:33:32.751702 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.755007 kubelet[2802]: W1213 14:33:32.751713 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.755007 kubelet[2802]: E1213 14:33:32.751726 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.755007 kubelet[2802]: E1213 14:33:32.752065 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.755007 kubelet[2802]: W1213 14:33:32.752077 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.755007 kubelet[2802]: E1213 14:33:32.752089 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.755007 kubelet[2802]: E1213 14:33:32.752829 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.755545 kubelet[2802]: W1213 14:33:32.752841 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.755545 kubelet[2802]: E1213 14:33:32.752855 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.755545 kubelet[2802]: E1213 14:33:32.753214 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.755545 kubelet[2802]: W1213 14:33:32.753226 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.755545 kubelet[2802]: E1213 14:33:32.753255 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.755545 kubelet[2802]: E1213 14:33:32.753730 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.755545 kubelet[2802]: W1213 14:33:32.753743 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.755545 kubelet[2802]: E1213 14:33:32.753757 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.755545 kubelet[2802]: E1213 14:33:32.753986 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.755545 kubelet[2802]: W1213 14:33:32.753996 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.758121 kubelet[2802]: E1213 14:33:32.754007 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.758121 kubelet[2802]: E1213 14:33:32.756871 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.758121 kubelet[2802]: W1213 14:33:32.756884 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.758121 kubelet[2802]: E1213 14:33:32.756900 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.758121 kubelet[2802]: E1213 14:33:32.757348 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.758121 kubelet[2802]: W1213 14:33:32.757381 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.758121 kubelet[2802]: E1213 14:33:32.757396 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.760143 kubelet[2802]: E1213 14:33:32.758235 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.760143 kubelet[2802]: W1213 14:33:32.758248 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.760143 kubelet[2802]: E1213 14:33:32.758264 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.760143 kubelet[2802]: E1213 14:33:32.758502 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.760143 kubelet[2802]: W1213 14:33:32.758511 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.760143 kubelet[2802]: E1213 14:33:32.758527 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.760143 kubelet[2802]: E1213 14:33:32.758743 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.760143 kubelet[2802]: W1213 14:33:32.758753 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.760143 kubelet[2802]: E1213 14:33:32.758791 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.760143 kubelet[2802]: E1213 14:33:32.759566 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.764225 kubelet[2802]: W1213 14:33:32.759578 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.764225 kubelet[2802]: E1213 14:33:32.759592 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.766837 kubelet[2802]: E1213 14:33:32.764344 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.766837 kubelet[2802]: W1213 14:33:32.764396 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.766837 kubelet[2802]: E1213 14:33:32.764417 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.769667 kubelet[2802]: E1213 14:33:32.766999 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.769667 kubelet[2802]: W1213 14:33:32.767016 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.769667 kubelet[2802]: E1213 14:33:32.767067 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.769667 kubelet[2802]: E1213 14:33:32.767775 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.769667 kubelet[2802]: W1213 14:33:32.767787 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.769667 kubelet[2802]: E1213 14:33:32.767798 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.769667 kubelet[2802]: E1213 14:33:32.768649 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.769667 kubelet[2802]: W1213 14:33:32.768663 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.769667 kubelet[2802]: E1213 14:33:32.768684 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.770303 kubelet[2802]: I1213 14:33:32.768916 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/21bac09b-9db9-4cf7-814e-0d0853580069-varrun\") pod \"csi-node-driver-x2vwj\" (UID: \"21bac09b-9db9-4cf7-814e-0d0853580069\") " pod="calico-system/csi-node-driver-x2vwj" Dec 13 14:33:32.770303 kubelet[2802]: E1213 14:33:32.769324 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.770303 kubelet[2802]: W1213 14:33:32.769338 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.770303 kubelet[2802]: E1213 14:33:32.769374 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.770303 kubelet[2802]: I1213 14:33:32.769399 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/21bac09b-9db9-4cf7-814e-0d0853580069-socket-dir\") pod \"csi-node-driver-x2vwj\" (UID: \"21bac09b-9db9-4cf7-814e-0d0853580069\") " pod="calico-system/csi-node-driver-x2vwj" Dec 13 14:33:32.771530 kubelet[2802]: E1213 14:33:32.771517 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.772412 kubelet[2802]: W1213 14:33:32.771701 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.772412 kubelet[2802]: E1213 14:33:32.771829 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.772412 kubelet[2802]: E1213 14:33:32.772072 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.772412 kubelet[2802]: W1213 14:33:32.772100 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.772412 kubelet[2802]: E1213 14:33:32.772122 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.772412 kubelet[2802]: I1213 14:33:32.772150 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/21bac09b-9db9-4cf7-814e-0d0853580069-registration-dir\") pod \"csi-node-driver-x2vwj\" (UID: \"21bac09b-9db9-4cf7-814e-0d0853580069\") " pod="calico-system/csi-node-driver-x2vwj" Dec 13 14:33:32.776830 kubelet[2802]: E1213 14:33:32.772636 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.776830 kubelet[2802]: W1213 14:33:32.772653 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.776830 kubelet[2802]: E1213 14:33:32.772671 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.776830 kubelet[2802]: E1213 14:33:32.772876 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.776830 kubelet[2802]: W1213 14:33:32.772885 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.776830 kubelet[2802]: E1213 14:33:32.772896 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.776830 kubelet[2802]: E1213 14:33:32.773166 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.776830 kubelet[2802]: W1213 14:33:32.773185 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.776830 kubelet[2802]: E1213 14:33:32.773213 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.776830 kubelet[2802]: E1213 14:33:32.773431 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.780417 kubelet[2802]: W1213 14:33:32.773440 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.780417 kubelet[2802]: E1213 14:33:32.773452 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.780417 kubelet[2802]: E1213 14:33:32.773728 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.780417 kubelet[2802]: W1213 14:33:32.773739 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.780417 kubelet[2802]: E1213 14:33:32.773754 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.780417 kubelet[2802]: E1213 14:33:32.773997 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.780417 kubelet[2802]: W1213 14:33:32.774008 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.780417 kubelet[2802]: E1213 14:33:32.774020 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.780417 kubelet[2802]: I1213 14:33:32.774046 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/21bac09b-9db9-4cf7-814e-0d0853580069-kubelet-dir\") pod \"csi-node-driver-x2vwj\" (UID: \"21bac09b-9db9-4cf7-814e-0d0853580069\") " pod="calico-system/csi-node-driver-x2vwj" Dec 13 14:33:32.780956 kubelet[2802]: E1213 14:33:32.774542 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.780956 kubelet[2802]: W1213 14:33:32.774559 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.780956 kubelet[2802]: E1213 14:33:32.774578 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.780956 kubelet[2802]: I1213 14:33:32.774599 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zgnpg\" (UniqueName: \"kubernetes.io/projected/21bac09b-9db9-4cf7-814e-0d0853580069-kube-api-access-zgnpg\") pod \"csi-node-driver-x2vwj\" (UID: \"21bac09b-9db9-4cf7-814e-0d0853580069\") " pod="calico-system/csi-node-driver-x2vwj" Dec 13 14:33:32.780956 kubelet[2802]: E1213 14:33:32.774875 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.780956 kubelet[2802]: W1213 14:33:32.774887 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.780956 kubelet[2802]: E1213 14:33:32.774949 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.780956 kubelet[2802]: E1213 14:33:32.775229 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.780956 kubelet[2802]: W1213 14:33:32.775239 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.781458 kubelet[2802]: E1213 14:33:32.775254 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.781458 kubelet[2802]: E1213 14:33:32.775699 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.781458 kubelet[2802]: W1213 14:33:32.775710 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.781458 kubelet[2802]: E1213 14:33:32.775726 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.781458 kubelet[2802]: E1213 14:33:32.776107 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.781458 kubelet[2802]: W1213 14:33:32.776119 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.781458 kubelet[2802]: E1213 14:33:32.776150 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.850793 env[1734]: time="2024-12-13T14:33:32.850740973Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-p2thv,Uid:1c0621a5-7914-4217-8122-6cd6b43c05c8,Namespace:calico-system,Attempt:0,}" Dec 13 14:33:32.875931 kubelet[2802]: E1213 14:33:32.875893 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.875931 kubelet[2802]: W1213 14:33:32.875924 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.876204 kubelet[2802]: E1213 14:33:32.875947 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.876380 kubelet[2802]: E1213 14:33:32.876306 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.876380 kubelet[2802]: W1213 14:33:32.876318 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.876380 kubelet[2802]: E1213 14:33:32.876336 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.876652 kubelet[2802]: E1213 14:33:32.876634 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.876652 kubelet[2802]: W1213 14:33:32.876652 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.877006 kubelet[2802]: E1213 14:33:32.876670 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.877152 kubelet[2802]: E1213 14:33:32.877135 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.877214 kubelet[2802]: W1213 14:33:32.877153 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.877214 kubelet[2802]: E1213 14:33:32.877170 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.877676 kubelet[2802]: E1213 14:33:32.877657 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.877676 kubelet[2802]: W1213 14:33:32.877675 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.879717 kubelet[2802]: E1213 14:33:32.877833 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.879893 kubelet[2802]: E1213 14:33:32.879871 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.879893 kubelet[2802]: W1213 14:33:32.879892 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.880008 kubelet[2802]: E1213 14:33:32.879997 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.880157 kubelet[2802]: E1213 14:33:32.880141 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.880221 kubelet[2802]: W1213 14:33:32.880158 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.880274 kubelet[2802]: E1213 14:33:32.880245 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.880407 kubelet[2802]: E1213 14:33:32.880393 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.880478 kubelet[2802]: W1213 14:33:32.880407 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.880539 kubelet[2802]: E1213 14:33:32.880492 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.880653 kubelet[2802]: E1213 14:33:32.880639 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.880714 kubelet[2802]: W1213 14:33:32.880655 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.880874 kubelet[2802]: E1213 14:33:32.880741 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.880987 kubelet[2802]: E1213 14:33:32.880972 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.881045 kubelet[2802]: W1213 14:33:32.880988 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.881045 kubelet[2802]: E1213 14:33:32.881005 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.881254 kubelet[2802]: E1213 14:33:32.881231 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.881254 kubelet[2802]: W1213 14:33:32.881254 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.881952 kubelet[2802]: E1213 14:33:32.881337 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.881952 kubelet[2802]: E1213 14:33:32.881483 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.881952 kubelet[2802]: W1213 14:33:32.881492 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.881952 kubelet[2802]: E1213 14:33:32.881572 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.881952 kubelet[2802]: E1213 14:33:32.881692 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.881952 kubelet[2802]: W1213 14:33:32.881698 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.881952 kubelet[2802]: E1213 14:33:32.881773 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.884525 kubelet[2802]: E1213 14:33:32.884495 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.884525 kubelet[2802]: W1213 14:33:32.884516 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.884700 kubelet[2802]: E1213 14:33:32.884619 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.884775 kubelet[2802]: E1213 14:33:32.884761 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.884839 kubelet[2802]: W1213 14:33:32.884776 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.884891 kubelet[2802]: E1213 14:33:32.884864 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.885011 kubelet[2802]: E1213 14:33:32.884993 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.885011 kubelet[2802]: W1213 14:33:32.885008 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.885320 kubelet[2802]: E1213 14:33:32.885088 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.885607 kubelet[2802]: E1213 14:33:32.885503 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.885607 kubelet[2802]: W1213 14:33:32.885513 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.885717 kubelet[2802]: E1213 14:33:32.885610 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.885793 kubelet[2802]: E1213 14:33:32.885775 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.885793 kubelet[2802]: W1213 14:33:32.885791 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.886706 kubelet[2802]: E1213 14:33:32.886682 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.886793 kubelet[2802]: E1213 14:33:32.886768 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.886793 kubelet[2802]: W1213 14:33:32.886776 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.887002 kubelet[2802]: E1213 14:33:32.886966 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.887172 kubelet[2802]: E1213 14:33:32.887158 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.887231 kubelet[2802]: W1213 14:33:32.887172 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.887556 kubelet[2802]: E1213 14:33:32.887459 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.887745 kubelet[2802]: E1213 14:33:32.887730 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.887822 kubelet[2802]: W1213 14:33:32.887746 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.887877 kubelet[2802]: E1213 14:33:32.887858 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.888110 kubelet[2802]: E1213 14:33:32.888011 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.888187 kubelet[2802]: W1213 14:33:32.888114 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.888257 kubelet[2802]: E1213 14:33:32.888242 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.888421 kubelet[2802]: E1213 14:33:32.888407 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.888490 kubelet[2802]: W1213 14:33:32.888422 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.891559 kubelet[2802]: E1213 14:33:32.891532 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.891835 kubelet[2802]: E1213 14:33:32.891817 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.891952 kubelet[2802]: W1213 14:33:32.891835 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.891952 kubelet[2802]: E1213 14:33:32.891939 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.892216 kubelet[2802]: E1213 14:33:32.892201 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.892282 kubelet[2802]: W1213 14:33:32.892218 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.892282 kubelet[2802]: E1213 14:33:32.892233 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.897798 env[1734]: time="2024-12-13T14:33:32.897758553Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-76998b76cf-nn94m,Uid:c42d8654-1498-4287-aa04-3add6f08431a,Namespace:calico-system,Attempt:0,} returns sandbox id \"136af3ff9b47286354bc2ff4b3a5eff73d95718e1856bbf3f260d78fa5a7ee4a\"" Dec 13 14:33:32.912380 kubelet[2802]: E1213 14:33:32.912342 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:32.912547 kubelet[2802]: W1213 14:33:32.912533 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:32.912646 kubelet[2802]: E1213 14:33:32.912633 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:32.923917 env[1734]: time="2024-12-13T14:33:32.923878446Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 14:33:32.924958 env[1734]: time="2024-12-13T14:33:32.924853919Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:33:32.925284 env[1734]: time="2024-12-13T14:33:32.925246195Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:33:32.926528 env[1734]: time="2024-12-13T14:33:32.926492365Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:33:32.927831 env[1734]: time="2024-12-13T14:33:32.927567379Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4ad48fbdfec94c0eea145232236559e847a2d5f4f3f56e87e8fb6042ffe4fdae pid=3283 runtime=io.containerd.runc.v2 Dec 13 14:33:32.963913 systemd[1]: Started cri-containerd-4ad48fbdfec94c0eea145232236559e847a2d5f4f3f56e87e8fb6042ffe4fdae.scope. Dec 13 14:33:32.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:32.989000 audit: BPF prog-id=122 op=LOAD Dec 13 14:33:33.002000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.002000 audit[3295]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3283 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:33.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461643438666264666563393463306565613134353233323233363535 Dec 13 14:33:33.002000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.002000 audit[3295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=3283 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:33.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461643438666264666563393463306565613134353233323233363535 Dec 13 14:33:33.002000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.002000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.002000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.002000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.002000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.002000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.002000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.002000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.002000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.002000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.002000 audit: BPF prog-id=123 op=LOAD Dec 13 14:33:33.002000 audit[3295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000254a90 items=0 ppid=3283 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:33.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461643438666264666563393463306565613134353233323233363535 Dec 13 14:33:33.002000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.002000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.002000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.002000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.002000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.002000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.002000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.002000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.002000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.002000 audit: BPF prog-id=124 op=LOAD Dec 13 14:33:33.002000 audit[3295]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000254ad8 items=0 ppid=3283 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:33.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461643438666264666563393463306565613134353233323233363535 Dec 13 14:33:33.002000 audit: BPF prog-id=124 op=UNLOAD Dec 13 14:33:33.003000 audit: BPF prog-id=123 op=UNLOAD Dec 13 14:33:33.003000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.003000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.003000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.003000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.003000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.003000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.003000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.003000 audit[3295]: AVC avc: denied { perfmon } for pid=3295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.003000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.003000 audit[3295]: AVC avc: denied { bpf } for pid=3295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:33.003000 audit: BPF prog-id=125 op=LOAD Dec 13 14:33:33.003000 audit[3295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000254ee8 items=0 ppid=3283 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:33.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461643438666264666563393463306565613134353233323233363535 Dec 13 14:33:33.040411 env[1734]: time="2024-12-13T14:33:33.040339299Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-p2thv,Uid:1c0621a5-7914-4217-8122-6cd6b43c05c8,Namespace:calico-system,Attempt:0,} returns sandbox id \"4ad48fbdfec94c0eea145232236559e847a2d5f4f3f56e87e8fb6042ffe4fdae\"" Dec 13 14:33:33.300000 audit[3319]: NETFILTER_CFG table=filter:93 family=2 entries=18 op=nft_register_rule pid=3319 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:33.300000 audit[3319]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffdd602e1a0 a2=0 a3=7ffdd602e18c items=0 ppid=2933 pid=3319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:33.300000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:33.305000 audit[3319]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3319 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:33.305000 audit[3319]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdd602e1a0 a2=0 a3=0 items=0 ppid=2933 pid=3319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:33.305000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:33.439101 systemd[1]: run-containerd-runc-k8s.io-136af3ff9b47286354bc2ff4b3a5eff73d95718e1856bbf3f260d78fa5a7ee4a-runc.2LSBWL.mount: Deactivated successfully. Dec 13 14:33:34.349142 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1542866012.mount: Deactivated successfully. Dec 13 14:33:34.931185 kubelet[2802]: E1213 14:33:34.930458 2802 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x2vwj" podUID="21bac09b-9db9-4cf7-814e-0d0853580069" Dec 13 14:33:35.466884 env[1734]: time="2024-12-13T14:33:35.466831112Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:35.469974 env[1734]: time="2024-12-13T14:33:35.469916794Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:35.472295 env[1734]: time="2024-12-13T14:33:35.472256907Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:35.474757 env[1734]: time="2024-12-13T14:33:35.474716375Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:35.475290 env[1734]: time="2024-12-13T14:33:35.475251513Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 14:33:35.482552 env[1734]: time="2024-12-13T14:33:35.478924064Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:33:35.510333 env[1734]: time="2024-12-13T14:33:35.510215515Z" level=info msg="CreateContainer within sandbox \"136af3ff9b47286354bc2ff4b3a5eff73d95718e1856bbf3f260d78fa5a7ee4a\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 14:33:35.534118 env[1734]: time="2024-12-13T14:33:35.534061119Z" level=info msg="CreateContainer within sandbox \"136af3ff9b47286354bc2ff4b3a5eff73d95718e1856bbf3f260d78fa5a7ee4a\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"677487a39e974be7ed7115568487a3eed61572427bd2bf445bd289782cfcaeee\"" Dec 13 14:33:35.535301 env[1734]: time="2024-12-13T14:33:35.535259629Z" level=info msg="StartContainer for \"677487a39e974be7ed7115568487a3eed61572427bd2bf445bd289782cfcaeee\"" Dec 13 14:33:35.580381 systemd[1]: Started cri-containerd-677487a39e974be7ed7115568487a3eed61572427bd2bf445bd289782cfcaeee.scope. Dec 13 14:33:35.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.604000 audit: BPF prog-id=126 op=LOAD Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3163 pid=3330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:35.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373438376133396539373462653765643731313535363834383761 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3163 pid=3330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:35.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373438376133396539373462653765643731313535363834383761 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit: BPF prog-id=127 op=LOAD Dec 13 14:33:35.605000 audit[3330]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d2940 items=0 ppid=3163 pid=3330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:35.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373438376133396539373462653765643731313535363834383761 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit: BPF prog-id=128 op=LOAD Dec 13 14:33:35.605000 audit[3330]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d2988 items=0 ppid=3163 pid=3330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:35.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373438376133396539373462653765643731313535363834383761 Dec 13 14:33:35.605000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:33:35.605000 audit: BPF prog-id=127 op=UNLOAD Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { perfmon } for pid=3330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit[3330]: AVC avc: denied { bpf } for pid=3330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:35.605000 audit: BPF prog-id=129 op=LOAD Dec 13 14:33:35.605000 audit[3330]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d2d98 items=0 ppid=3163 pid=3330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:35.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373438376133396539373462653765643731313535363834383761 Dec 13 14:33:35.665328 env[1734]: time="2024-12-13T14:33:35.665271516Z" level=info msg="StartContainer for \"677487a39e974be7ed7115568487a3eed61572427bd2bf445bd289782cfcaeee\" returns successfully" Dec 13 14:33:36.104238 kubelet[2802]: E1213 14:33:36.104200 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.104238 kubelet[2802]: W1213 14:33:36.104232 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.104803 kubelet[2802]: E1213 14:33:36.104256 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.104803 kubelet[2802]: E1213 14:33:36.104506 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.104803 kubelet[2802]: W1213 14:33:36.104516 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.104803 kubelet[2802]: E1213 14:33:36.104530 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.104803 kubelet[2802]: E1213 14:33:36.104716 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.104803 kubelet[2802]: W1213 14:33:36.104724 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.104803 kubelet[2802]: E1213 14:33:36.104736 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.105560 kubelet[2802]: E1213 14:33:36.104930 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.105560 kubelet[2802]: W1213 14:33:36.104940 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.105560 kubelet[2802]: E1213 14:33:36.104951 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.105560 kubelet[2802]: E1213 14:33:36.105546 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.105560 kubelet[2802]: W1213 14:33:36.105557 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.105838 kubelet[2802]: E1213 14:33:36.105572 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.105838 kubelet[2802]: E1213 14:33:36.105761 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.105838 kubelet[2802]: W1213 14:33:36.105770 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.105838 kubelet[2802]: E1213 14:33:36.105781 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.106037 kubelet[2802]: E1213 14:33:36.105970 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.106037 kubelet[2802]: W1213 14:33:36.105979 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.106037 kubelet[2802]: E1213 14:33:36.105992 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.106518 kubelet[2802]: E1213 14:33:36.106501 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.106575 kubelet[2802]: W1213 14:33:36.106519 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.106575 kubelet[2802]: E1213 14:33:36.106536 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.106824 kubelet[2802]: E1213 14:33:36.106801 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.106824 kubelet[2802]: W1213 14:33:36.106821 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.107129 kubelet[2802]: E1213 14:33:36.106834 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.107328 kubelet[2802]: E1213 14:33:36.107284 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.107328 kubelet[2802]: W1213 14:33:36.107296 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.107328 kubelet[2802]: E1213 14:33:36.107310 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.108800 kubelet[2802]: E1213 14:33:36.107675 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.108800 kubelet[2802]: W1213 14:33:36.107689 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.108800 kubelet[2802]: E1213 14:33:36.107702 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.108800 kubelet[2802]: E1213 14:33:36.107895 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.108800 kubelet[2802]: W1213 14:33:36.107903 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.108800 kubelet[2802]: E1213 14:33:36.107914 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.108800 kubelet[2802]: E1213 14:33:36.108243 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.108800 kubelet[2802]: W1213 14:33:36.108254 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.108800 kubelet[2802]: E1213 14:33:36.108267 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.108800 kubelet[2802]: E1213 14:33:36.108534 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.109391 kubelet[2802]: W1213 14:33:36.108543 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.109391 kubelet[2802]: E1213 14:33:36.108557 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.109391 kubelet[2802]: E1213 14:33:36.108740 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.109391 kubelet[2802]: W1213 14:33:36.108749 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.109391 kubelet[2802]: E1213 14:33:36.108762 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.109391 kubelet[2802]: E1213 14:33:36.109035 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.109391 kubelet[2802]: W1213 14:33:36.109046 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.109391 kubelet[2802]: E1213 14:33:36.109061 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.109391 kubelet[2802]: E1213 14:33:36.109332 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.109391 kubelet[2802]: W1213 14:33:36.109341 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.109925 kubelet[2802]: E1213 14:33:36.109402 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.109925 kubelet[2802]: E1213 14:33:36.109743 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.109925 kubelet[2802]: W1213 14:33:36.109754 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.109925 kubelet[2802]: E1213 14:33:36.109770 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.110105 kubelet[2802]: E1213 14:33:36.109993 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.110105 kubelet[2802]: W1213 14:33:36.110003 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.110105 kubelet[2802]: E1213 14:33:36.110020 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.110258 kubelet[2802]: E1213 14:33:36.110236 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.110258 kubelet[2802]: W1213 14:33:36.110245 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.110389 kubelet[2802]: E1213 14:33:36.110260 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.113379 kubelet[2802]: E1213 14:33:36.110529 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.113379 kubelet[2802]: W1213 14:33:36.110542 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.113379 kubelet[2802]: E1213 14:33:36.110624 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.113379 kubelet[2802]: E1213 14:33:36.110786 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.113379 kubelet[2802]: W1213 14:33:36.110795 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.113379 kubelet[2802]: E1213 14:33:36.110873 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.113379 kubelet[2802]: E1213 14:33:36.111004 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.113379 kubelet[2802]: W1213 14:33:36.111011 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.113379 kubelet[2802]: E1213 14:33:36.111086 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.113379 kubelet[2802]: E1213 14:33:36.111214 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.114022 kubelet[2802]: W1213 14:33:36.111222 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.114022 kubelet[2802]: E1213 14:33:36.111236 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.114022 kubelet[2802]: E1213 14:33:36.111894 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.114022 kubelet[2802]: W1213 14:33:36.111906 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.114022 kubelet[2802]: E1213 14:33:36.111922 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.114022 kubelet[2802]: E1213 14:33:36.112133 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.114022 kubelet[2802]: W1213 14:33:36.112142 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.114022 kubelet[2802]: E1213 14:33:36.112159 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.114022 kubelet[2802]: E1213 14:33:36.112448 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.114022 kubelet[2802]: W1213 14:33:36.112458 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.114684 kubelet[2802]: E1213 14:33:36.112536 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.114684 kubelet[2802]: E1213 14:33:36.113055 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.114684 kubelet[2802]: W1213 14:33:36.113065 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.114684 kubelet[2802]: E1213 14:33:36.113152 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.114684 kubelet[2802]: E1213 14:33:36.113303 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.114684 kubelet[2802]: W1213 14:33:36.113312 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.114684 kubelet[2802]: E1213 14:33:36.113555 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.114684 kubelet[2802]: E1213 14:33:36.113753 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.114684 kubelet[2802]: W1213 14:33:36.113763 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.114684 kubelet[2802]: E1213 14:33:36.113779 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.115140 kubelet[2802]: E1213 14:33:36.114247 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.115140 kubelet[2802]: W1213 14:33:36.114259 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.115140 kubelet[2802]: E1213 14:33:36.114272 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.115140 kubelet[2802]: E1213 14:33:36.114618 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.115140 kubelet[2802]: W1213 14:33:36.114631 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.115140 kubelet[2802]: E1213 14:33:36.114647 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.115140 kubelet[2802]: E1213 14:33:36.115067 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:36.115140 kubelet[2802]: W1213 14:33:36.115077 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:36.115140 kubelet[2802]: E1213 14:33:36.115089 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:36.490411 systemd[1]: run-containerd-runc-k8s.io-677487a39e974be7ed7115568487a3eed61572427bd2bf445bd289782cfcaeee-runc.lXeVRl.mount: Deactivated successfully. Dec 13 14:33:36.930389 kubelet[2802]: E1213 14:33:36.929893 2802 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x2vwj" podUID="21bac09b-9db9-4cf7-814e-0d0853580069" Dec 13 14:33:36.976642 env[1734]: time="2024-12-13T14:33:36.976577621Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:36.980475 env[1734]: time="2024-12-13T14:33:36.980433155Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:36.982818 env[1734]: time="2024-12-13T14:33:36.982760163Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:36.992073 env[1734]: time="2024-12-13T14:33:36.992024907Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:36.994786 env[1734]: time="2024-12-13T14:33:36.994687510Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:33:37.014869 env[1734]: time="2024-12-13T14:33:37.014825319Z" level=info msg="CreateContainer within sandbox \"4ad48fbdfec94c0eea145232236559e847a2d5f4f3f56e87e8fb6042ffe4fdae\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:33:37.036892 kubelet[2802]: I1213 14:33:37.035582 2802 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:33:37.064897 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3547095100.mount: Deactivated successfully. Dec 13 14:33:37.072234 env[1734]: time="2024-12-13T14:33:37.072191359Z" level=info msg="CreateContainer within sandbox \"4ad48fbdfec94c0eea145232236559e847a2d5f4f3f56e87e8fb6042ffe4fdae\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"d11687c2149c33240858c2301082e1122cb5e3cfd177a76bf7e6a9c2d719b94f\"" Dec 13 14:33:37.073913 env[1734]: time="2024-12-13T14:33:37.073077041Z" level=info msg="StartContainer for \"d11687c2149c33240858c2301082e1122cb5e3cfd177a76bf7e6a9c2d719b94f\"" Dec 13 14:33:37.116401 systemd[1]: Started cri-containerd-d11687c2149c33240858c2301082e1122cb5e3cfd177a76bf7e6a9c2d719b94f.scope. Dec 13 14:33:37.127514 kubelet[2802]: E1213 14:33:37.127458 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.127514 kubelet[2802]: W1213 14:33:37.127488 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.127514 kubelet[2802]: E1213 14:33:37.127513 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.128299 kubelet[2802]: E1213 14:33:37.127857 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.128299 kubelet[2802]: W1213 14:33:37.127869 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.128299 kubelet[2802]: E1213 14:33:37.127887 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.128299 kubelet[2802]: E1213 14:33:37.128079 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.128299 kubelet[2802]: W1213 14:33:37.128088 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.128299 kubelet[2802]: E1213 14:33:37.128100 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.128794 kubelet[2802]: E1213 14:33:37.128434 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.128794 kubelet[2802]: W1213 14:33:37.128445 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.128794 kubelet[2802]: E1213 14:33:37.128459 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.128953 kubelet[2802]: E1213 14:33:37.128923 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.128953 kubelet[2802]: W1213 14:33:37.128935 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.128953 kubelet[2802]: E1213 14:33:37.128949 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.129376 kubelet[2802]: E1213 14:33:37.129285 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.129376 kubelet[2802]: W1213 14:33:37.129296 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.129376 kubelet[2802]: E1213 14:33:37.129308 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.129543 kubelet[2802]: E1213 14:33:37.129510 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.129543 kubelet[2802]: W1213 14:33:37.129520 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.129543 kubelet[2802]: E1213 14:33:37.129532 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.129741 kubelet[2802]: E1213 14:33:37.129710 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.129741 kubelet[2802]: W1213 14:33:37.129720 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.129741 kubelet[2802]: E1213 14:33:37.129732 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.129938 kubelet[2802]: E1213 14:33:37.129920 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.130020 kubelet[2802]: W1213 14:33:37.129939 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.130020 kubelet[2802]: E1213 14:33:37.129950 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.130145 kubelet[2802]: E1213 14:33:37.130134 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.130145 kubelet[2802]: W1213 14:33:37.130144 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.130275 kubelet[2802]: E1213 14:33:37.130156 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.130364 kubelet[2802]: E1213 14:33:37.130337 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.130438 kubelet[2802]: W1213 14:33:37.130366 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.130438 kubelet[2802]: E1213 14:33:37.130379 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.130585 kubelet[2802]: E1213 14:33:37.130570 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.130585 kubelet[2802]: W1213 14:33:37.130584 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.130750 kubelet[2802]: E1213 14:33:37.130597 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.130802 kubelet[2802]: E1213 14:33:37.130787 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.130802 kubelet[2802]: W1213 14:33:37.130796 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.130907 kubelet[2802]: E1213 14:33:37.130808 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.131082 kubelet[2802]: E1213 14:33:37.131059 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.131082 kubelet[2802]: W1213 14:33:37.131069 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.131194 kubelet[2802]: E1213 14:33:37.131081 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.131412 kubelet[2802]: E1213 14:33:37.131276 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.131412 kubelet[2802]: W1213 14:33:37.131295 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.131412 kubelet[2802]: E1213 14:33:37.131307 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.146000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.147697 kernel: kauditd_printk_skb: 179 callbacks suppressed Dec 13 14:33:37.147787 kernel: audit: type=1400 audit(1734100417.146:989): avc: denied { perfmon } for pid=3400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.146000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f54284e4b18 items=0 ppid=3283 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.157864 kernel: audit: type=1300 audit(1734100417.146:989): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f54284e4b18 items=0 ppid=3283 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.157991 kernel: audit: type=1327 audit(1734100417.146:989): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431313638376332313439633333323430383538633233303130383265 Dec 13 14:33:37.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431313638376332313439633333323430383538633233303130383265 Dec 13 14:33:37.168549 kernel: audit: type=1400 audit(1734100417.146:990): avc: denied { bpf } for pid=3400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.168698 kernel: audit: type=1400 audit(1734100417.146:990): avc: denied { bpf } for pid=3400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.146000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.146000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.146000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.176926 kernel: audit: type=1400 audit(1734100417.146:990): avc: denied { bpf } for pid=3400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.177110 kernel: audit: type=1400 audit(1734100417.146:990): avc: denied { perfmon } for pid=3400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.146000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.186061 kernel: audit: type=1400 audit(1734100417.146:990): avc: denied { perfmon } for pid=3400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.186215 kernel: audit: type=1400 audit(1734100417.146:990): avc: denied { perfmon } for pid=3400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.146000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.146000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.146000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.146000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.146000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.197590 kernel: audit: type=1400 audit(1734100417.146:990): avc: denied { perfmon } for pid=3400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.146000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.146000 audit: BPF prog-id=130 op=LOAD Dec 13 14:33:37.146000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00028aa78 items=0 ppid=3283 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431313638376332313439633333323430383538633233303130383265 Dec 13 14:33:37.150000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.150000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.150000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.150000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.150000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.150000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.150000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.150000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.150000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.150000 audit: BPF prog-id=131 op=LOAD Dec 13 14:33:37.150000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00028aac8 items=0 ppid=3283 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431313638376332313439633333323430383538633233303130383265 Dec 13 14:33:37.171000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:33:37.171000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:33:37.171000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.171000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.171000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.171000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.171000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.171000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.171000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.171000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.171000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.171000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.171000 audit: BPF prog-id=132 op=LOAD Dec 13 14:33:37.171000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00028ab58 items=0 ppid=3283 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431313638376332313439633333323430383538633233303130383265 Dec 13 14:33:37.219525 env[1734]: time="2024-12-13T14:33:37.219472539Z" level=info msg="StartContainer for \"d11687c2149c33240858c2301082e1122cb5e3cfd177a76bf7e6a9c2d719b94f\" returns successfully" Dec 13 14:33:37.223582 kubelet[2802]: E1213 14:33:37.223324 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.223582 kubelet[2802]: W1213 14:33:37.223346 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.223582 kubelet[2802]: E1213 14:33:37.223425 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.224266 kubelet[2802]: E1213 14:33:37.224099 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.224266 kubelet[2802]: W1213 14:33:37.224111 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.224266 kubelet[2802]: E1213 14:33:37.224132 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.224695 kubelet[2802]: E1213 14:33:37.224518 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.224695 kubelet[2802]: W1213 14:33:37.224529 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.224695 kubelet[2802]: E1213 14:33:37.224540 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.225011 kubelet[2802]: E1213 14:33:37.224879 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.225011 kubelet[2802]: W1213 14:33:37.224888 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.225011 kubelet[2802]: E1213 14:33:37.224902 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.225328 kubelet[2802]: E1213 14:33:37.225208 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.225328 kubelet[2802]: W1213 14:33:37.225220 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.225328 kubelet[2802]: E1213 14:33:37.225240 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.225508 kubelet[2802]: E1213 14:33:37.225462 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.225508 kubelet[2802]: W1213 14:33:37.225475 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.225508 kubelet[2802]: E1213 14:33:37.225489 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.225744 kubelet[2802]: E1213 14:33:37.225721 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.225744 kubelet[2802]: W1213 14:33:37.225736 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.225943 kubelet[2802]: E1213 14:33:37.225753 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.226191 kubelet[2802]: E1213 14:33:37.226175 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.226277 kubelet[2802]: W1213 14:33:37.226191 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.226465 kubelet[2802]: E1213 14:33:37.226370 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.226465 kubelet[2802]: E1213 14:33:37.226391 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.226465 kubelet[2802]: W1213 14:33:37.226399 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.226465 kubelet[2802]: E1213 14:33:37.226421 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.226708 kubelet[2802]: E1213 14:33:37.226580 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.226708 kubelet[2802]: W1213 14:33:37.226589 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.226708 kubelet[2802]: E1213 14:33:37.226607 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.226855 kubelet[2802]: E1213 14:33:37.226787 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.226855 kubelet[2802]: W1213 14:33:37.226795 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.226855 kubelet[2802]: E1213 14:33:37.226806 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.227009 kubelet[2802]: E1213 14:33:37.226971 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.227009 kubelet[2802]: W1213 14:33:37.226979 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.227009 kubelet[2802]: E1213 14:33:37.226990 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.227648 kubelet[2802]: E1213 14:33:37.227184 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.227648 kubelet[2802]: W1213 14:33:37.227195 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.227648 kubelet[2802]: E1213 14:33:37.227206 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.227648 kubelet[2802]: E1213 14:33:37.227571 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.227648 kubelet[2802]: W1213 14:33:37.227580 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.227648 kubelet[2802]: E1213 14:33:37.227592 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.228042 kubelet[2802]: E1213 14:33:37.227778 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.228042 kubelet[2802]: W1213 14:33:37.227789 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.228042 kubelet[2802]: E1213 14:33:37.227800 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.228042 kubelet[2802]: E1213 14:33:37.227970 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.228042 kubelet[2802]: W1213 14:33:37.227978 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.228042 kubelet[2802]: E1213 14:33:37.227989 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.228369 kubelet[2802]: E1213 14:33:37.228184 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.228369 kubelet[2802]: W1213 14:33:37.228193 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.228369 kubelet[2802]: E1213 14:33:37.228204 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.229247 kubelet[2802]: E1213 14:33:37.228876 2802 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:37.229247 kubelet[2802]: W1213 14:33:37.228889 2802 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:37.229247 kubelet[2802]: E1213 14:33:37.228903 2802 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:37.250629 systemd[1]: cri-containerd-d11687c2149c33240858c2301082e1122cb5e3cfd177a76bf7e6a9c2d719b94f.scope: Deactivated successfully. Dec 13 14:33:37.254000 audit: BPF prog-id=132 op=UNLOAD Dec 13 14:33:37.463758 env[1734]: time="2024-12-13T14:33:37.463621430Z" level=info msg="shim disconnected" id=d11687c2149c33240858c2301082e1122cb5e3cfd177a76bf7e6a9c2d719b94f Dec 13 14:33:37.463758 env[1734]: time="2024-12-13T14:33:37.463677170Z" level=warning msg="cleaning up after shim disconnected" id=d11687c2149c33240858c2301082e1122cb5e3cfd177a76bf7e6a9c2d719b94f namespace=k8s.io Dec 13 14:33:37.463758 env[1734]: time="2024-12-13T14:33:37.463691452Z" level=info msg="cleaning up dead shim" Dec 13 14:33:37.479966 env[1734]: time="2024-12-13T14:33:37.479917433Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:33:37Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3471 runtime=io.containerd.runc.v2\n" Dec 13 14:33:37.493877 systemd[1]: run-containerd-runc-k8s.io-d11687c2149c33240858c2301082e1122cb5e3cfd177a76bf7e6a9c2d719b94f-runc.E1OyfW.mount: Deactivated successfully. Dec 13 14:33:37.494456 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d11687c2149c33240858c2301082e1122cb5e3cfd177a76bf7e6a9c2d719b94f-rootfs.mount: Deactivated successfully. Dec 13 14:33:38.050480 env[1734]: time="2024-12-13T14:33:38.050441319Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:33:38.070916 kubelet[2802]: I1213 14:33:38.070857 2802 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-76998b76cf-nn94m" podStartSLOduration=3.514001286 podStartE2EDuration="6.070833496s" podCreationTimestamp="2024-12-13 14:33:32 +0000 UTC" firstStartedPulling="2024-12-13 14:33:32.919961501 +0000 UTC m=+21.362337868" lastFinishedPulling="2024-12-13 14:33:35.476793702 +0000 UTC m=+23.919170078" observedRunningTime="2024-12-13 14:33:36.06959212 +0000 UTC m=+24.511968495" watchObservedRunningTime="2024-12-13 14:33:38.070833496 +0000 UTC m=+26.513209870" Dec 13 14:33:38.929807 kubelet[2802]: E1213 14:33:38.929753 2802 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x2vwj" podUID="21bac09b-9db9-4cf7-814e-0d0853580069" Dec 13 14:33:40.931735 kubelet[2802]: E1213 14:33:40.931657 2802 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x2vwj" podUID="21bac09b-9db9-4cf7-814e-0d0853580069" Dec 13 14:33:42.930065 kubelet[2802]: E1213 14:33:42.930017 2802 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x2vwj" podUID="21bac09b-9db9-4cf7-814e-0d0853580069" Dec 13 14:33:43.350307 env[1734]: time="2024-12-13T14:33:43.350178512Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:43.362662 env[1734]: time="2024-12-13T14:33:43.362599905Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:43.377052 env[1734]: time="2024-12-13T14:33:43.377002395Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:43.389913 env[1734]: time="2024-12-13T14:33:43.389863918Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:43.391012 env[1734]: time="2024-12-13T14:33:43.390914816Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:33:43.398173 env[1734]: time="2024-12-13T14:33:43.397484879Z" level=info msg="CreateContainer within sandbox \"4ad48fbdfec94c0eea145232236559e847a2d5f4f3f56e87e8fb6042ffe4fdae\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:33:43.527227 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3398804389.mount: Deactivated successfully. Dec 13 14:33:43.534490 env[1734]: time="2024-12-13T14:33:43.534310678Z" level=info msg="CreateContainer within sandbox \"4ad48fbdfec94c0eea145232236559e847a2d5f4f3f56e87e8fb6042ffe4fdae\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"8400899a08412b6749612ffbc6968aeee4f842b1f1f142e6a2493e510ca65e19\"" Dec 13 14:33:43.536994 env[1734]: time="2024-12-13T14:33:43.535415361Z" level=info msg="StartContainer for \"8400899a08412b6749612ffbc6968aeee4f842b1f1f142e6a2493e510ca65e19\"" Dec 13 14:33:43.571968 systemd[1]: run-containerd-runc-k8s.io-8400899a08412b6749612ffbc6968aeee4f842b1f1f142e6a2493e510ca65e19-runc.E2uz0U.mount: Deactivated successfully. Dec 13 14:33:43.578896 systemd[1]: Started cri-containerd-8400899a08412b6749612ffbc6968aeee4f842b1f1f142e6a2493e510ca65e19.scope. Dec 13 14:33:43.607076 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:33:43.607232 kernel: audit: type=1400 audit(1734100423.602:996): avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.602000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.602000 audit[3496]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f7d4515f958 items=0 ppid=3283 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:43.614829 kernel: audit: type=1300 audit(1734100423.602:996): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f7d4515f958 items=0 ppid=3283 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:43.615084 kernel: audit: type=1327 audit(1734100423.602:996): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834303038393961303834313262363734393631326666626336393638 Dec 13 14:33:43.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834303038393961303834313262363734393631326666626336393638 Dec 13 14:33:43.602000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.624516 kernel: audit: type=1400 audit(1734100423.602:997): avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.602000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.636569 kernel: audit: type=1400 audit(1734100423.602:997): avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.602000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.641384 kernel: audit: type=1400 audit(1734100423.602:997): avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.602000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.651471 kernel: audit: type=1400 audit(1734100423.602:997): avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.661686 kernel: audit: type=1400 audit(1734100423.602:997): avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.661765 kernel: audit: type=1400 audit(1734100423.602:997): avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.661787 kernel: audit: type=1400 audit(1734100423.602:997): avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.602000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.602000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.602000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.602000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.602000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.602000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.602000 audit: BPF prog-id=133 op=LOAD Dec 13 14:33:43.602000 audit[3496]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000282218 items=0 ppid=3283 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:43.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834303038393961303834313262363734393631326666626336393638 Dec 13 14:33:43.606000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.606000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.606000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.606000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.606000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.606000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.606000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.606000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.606000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.606000 audit: BPF prog-id=134 op=LOAD Dec 13 14:33:43.606000 audit[3496]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000282268 items=0 ppid=3283 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:43.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834303038393961303834313262363734393631326666626336393638 Dec 13 14:33:43.606000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:33:43.606000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:33:43.606000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.606000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.606000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.606000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.606000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.606000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.606000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.606000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.606000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.606000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:43.606000 audit: BPF prog-id=135 op=LOAD Dec 13 14:33:43.606000 audit[3496]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002822f8 items=0 ppid=3283 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:43.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834303038393961303834313262363734393631326666626336393638 Dec 13 14:33:43.663568 env[1734]: time="2024-12-13T14:33:43.662698028Z" level=info msg="StartContainer for \"8400899a08412b6749612ffbc6968aeee4f842b1f1f142e6a2493e510ca65e19\" returns successfully" Dec 13 14:33:44.932157 kubelet[2802]: E1213 14:33:44.932094 2802 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x2vwj" podUID="21bac09b-9db9-4cf7-814e-0d0853580069" Dec 13 14:33:45.050686 env[1734]: time="2024-12-13T14:33:45.050610694Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:33:45.053569 systemd[1]: cri-containerd-8400899a08412b6749612ffbc6968aeee4f842b1f1f142e6a2493e510ca65e19.scope: Deactivated successfully. Dec 13 14:33:45.058000 audit: BPF prog-id=135 op=UNLOAD Dec 13 14:33:45.081696 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8400899a08412b6749612ffbc6968aeee4f842b1f1f142e6a2493e510ca65e19-rootfs.mount: Deactivated successfully. Dec 13 14:33:45.101773 env[1734]: time="2024-12-13T14:33:45.101724441Z" level=info msg="shim disconnected" id=8400899a08412b6749612ffbc6968aeee4f842b1f1f142e6a2493e510ca65e19 Dec 13 14:33:45.101773 env[1734]: time="2024-12-13T14:33:45.101771872Z" level=warning msg="cleaning up after shim disconnected" id=8400899a08412b6749612ffbc6968aeee4f842b1f1f142e6a2493e510ca65e19 namespace=k8s.io Dec 13 14:33:45.101773 env[1734]: time="2024-12-13T14:33:45.101781173Z" level=info msg="cleaning up dead shim" Dec 13 14:33:45.111253 env[1734]: time="2024-12-13T14:33:45.111197896Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:33:45Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3537 runtime=io.containerd.runc.v2\n" Dec 13 14:33:45.130851 kubelet[2802]: I1213 14:33:45.130817 2802 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:33:45.197585 kubelet[2802]: I1213 14:33:45.197428 2802 topology_manager.go:215] "Topology Admit Handler" podUID="74fcd6f9-93f1-4dfe-99ac-a1543b30279a" podNamespace="kube-system" podName="coredns-7db6d8ff4d-7sbc7" Dec 13 14:33:45.203757 kubelet[2802]: I1213 14:33:45.203726 2802 topology_manager.go:215] "Topology Admit Handler" podUID="7abbd636-a28b-4594-90af-7cf85567b8ac" podNamespace="kube-system" podName="coredns-7db6d8ff4d-2hzrj" Dec 13 14:33:45.204704 systemd[1]: Created slice kubepods-burstable-pod74fcd6f9_93f1_4dfe_99ac_a1543b30279a.slice. Dec 13 14:33:45.217386 kubelet[2802]: I1213 14:33:45.217337 2802 topology_manager.go:215] "Topology Admit Handler" podUID="dca070a3-4cd0-4f67-ba56-957513d4401c" podNamespace="calico-system" podName="calico-kube-controllers-888c7f5dd-6vnlq" Dec 13 14:33:45.221928 systemd[1]: Created slice kubepods-burstable-pod7abbd636_a28b_4594_90af_7cf85567b8ac.slice. Dec 13 14:33:45.226823 kubelet[2802]: I1213 14:33:45.226784 2802 topology_manager.go:215] "Topology Admit Handler" podUID="ee4d2866-d469-4d0b-9e9f-6b3aa8e11102" podNamespace="calico-apiserver" podName="calico-apiserver-7cb8854c79-z24zd" Dec 13 14:33:45.236070 systemd[1]: Created slice kubepods-besteffort-poddca070a3_4cd0_4f67_ba56_957513d4401c.slice. Dec 13 14:33:45.238819 kubelet[2802]: I1213 14:33:45.238789 2802 topology_manager.go:215] "Topology Admit Handler" podUID="9f8354fa-b7b2-49de-ab0f-223918f4108f" podNamespace="calico-apiserver" podName="calico-apiserver-7cb8854c79-5mr9j" Dec 13 14:33:45.257411 kubelet[2802]: W1213 14:33:45.255426 2802 reflector.go:547] object-"calico-apiserver"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ip-172-31-19-209" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ip-172-31-19-209' and this object Dec 13 14:33:45.257711 kubelet[2802]: E1213 14:33:45.257649 2802 reflector.go:150] object-"calico-apiserver"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ip-172-31-19-209" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ip-172-31-19-209' and this object Dec 13 14:33:45.262334 systemd[1]: Created slice kubepods-besteffort-podee4d2866_d469_4d0b_9e9f_6b3aa8e11102.slice. Dec 13 14:33:45.278552 systemd[1]: Created slice kubepods-besteffort-pod9f8354fa_b7b2_49de_ab0f_223918f4108f.slice. Dec 13 14:33:45.310024 kubelet[2802]: I1213 14:33:45.309982 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gqk7w\" (UniqueName: \"kubernetes.io/projected/9f8354fa-b7b2-49de-ab0f-223918f4108f-kube-api-access-gqk7w\") pod \"calico-apiserver-7cb8854c79-5mr9j\" (UID: \"9f8354fa-b7b2-49de-ab0f-223918f4108f\") " pod="calico-apiserver/calico-apiserver-7cb8854c79-5mr9j" Dec 13 14:33:45.310228 kubelet[2802]: I1213 14:33:45.310034 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v56lh\" (UniqueName: \"kubernetes.io/projected/ee4d2866-d469-4d0b-9e9f-6b3aa8e11102-kube-api-access-v56lh\") pod \"calico-apiserver-7cb8854c79-z24zd\" (UID: \"ee4d2866-d469-4d0b-9e9f-6b3aa8e11102\") " pod="calico-apiserver/calico-apiserver-7cb8854c79-z24zd" Dec 13 14:33:45.310228 kubelet[2802]: I1213 14:33:45.310063 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/74fcd6f9-93f1-4dfe-99ac-a1543b30279a-config-volume\") pod \"coredns-7db6d8ff4d-7sbc7\" (UID: \"74fcd6f9-93f1-4dfe-99ac-a1543b30279a\") " pod="kube-system/coredns-7db6d8ff4d-7sbc7" Dec 13 14:33:45.310228 kubelet[2802]: I1213 14:33:45.310093 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/dca070a3-4cd0-4f67-ba56-957513d4401c-tigera-ca-bundle\") pod \"calico-kube-controllers-888c7f5dd-6vnlq\" (UID: \"dca070a3-4cd0-4f67-ba56-957513d4401c\") " pod="calico-system/calico-kube-controllers-888c7f5dd-6vnlq" Dec 13 14:33:45.310228 kubelet[2802]: I1213 14:33:45.310115 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/7abbd636-a28b-4594-90af-7cf85567b8ac-config-volume\") pod \"coredns-7db6d8ff4d-2hzrj\" (UID: \"7abbd636-a28b-4594-90af-7cf85567b8ac\") " pod="kube-system/coredns-7db6d8ff4d-2hzrj" Dec 13 14:33:45.310228 kubelet[2802]: I1213 14:33:45.310138 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z87mf\" (UniqueName: \"kubernetes.io/projected/74fcd6f9-93f1-4dfe-99ac-a1543b30279a-kube-api-access-z87mf\") pod \"coredns-7db6d8ff4d-7sbc7\" (UID: \"74fcd6f9-93f1-4dfe-99ac-a1543b30279a\") " pod="kube-system/coredns-7db6d8ff4d-7sbc7" Dec 13 14:33:45.310508 kubelet[2802]: I1213 14:33:45.310159 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/9f8354fa-b7b2-49de-ab0f-223918f4108f-calico-apiserver-certs\") pod \"calico-apiserver-7cb8854c79-5mr9j\" (UID: \"9f8354fa-b7b2-49de-ab0f-223918f4108f\") " pod="calico-apiserver/calico-apiserver-7cb8854c79-5mr9j" Dec 13 14:33:45.310508 kubelet[2802]: I1213 14:33:45.310183 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hmk2q\" (UniqueName: \"kubernetes.io/projected/dca070a3-4cd0-4f67-ba56-957513d4401c-kube-api-access-hmk2q\") pod \"calico-kube-controllers-888c7f5dd-6vnlq\" (UID: \"dca070a3-4cd0-4f67-ba56-957513d4401c\") " pod="calico-system/calico-kube-controllers-888c7f5dd-6vnlq" Dec 13 14:33:45.310508 kubelet[2802]: I1213 14:33:45.310209 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/ee4d2866-d469-4d0b-9e9f-6b3aa8e11102-calico-apiserver-certs\") pod \"calico-apiserver-7cb8854c79-z24zd\" (UID: \"ee4d2866-d469-4d0b-9e9f-6b3aa8e11102\") " pod="calico-apiserver/calico-apiserver-7cb8854c79-z24zd" Dec 13 14:33:45.310508 kubelet[2802]: I1213 14:33:45.310233 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-75ghq\" (UniqueName: \"kubernetes.io/projected/7abbd636-a28b-4594-90af-7cf85567b8ac-kube-api-access-75ghq\") pod \"coredns-7db6d8ff4d-2hzrj\" (UID: \"7abbd636-a28b-4594-90af-7cf85567b8ac\") " pod="kube-system/coredns-7db6d8ff4d-2hzrj" Dec 13 14:33:45.515511 env[1734]: time="2024-12-13T14:33:45.515393180Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-7sbc7,Uid:74fcd6f9-93f1-4dfe-99ac-a1543b30279a,Namespace:kube-system,Attempt:0,}" Dec 13 14:33:45.537754 env[1734]: time="2024-12-13T14:33:45.537563468Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-2hzrj,Uid:7abbd636-a28b-4594-90af-7cf85567b8ac,Namespace:kube-system,Attempt:0,}" Dec 13 14:33:45.555720 env[1734]: time="2024-12-13T14:33:45.555676789Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-888c7f5dd-6vnlq,Uid:dca070a3-4cd0-4f67-ba56-957513d4401c,Namespace:calico-system,Attempt:0,}" Dec 13 14:33:46.000918 env[1734]: time="2024-12-13T14:33:46.000833249Z" level=error msg="Failed to destroy network for sandbox \"ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:46.001794 env[1734]: time="2024-12-13T14:33:46.001742594Z" level=error msg="encountered an error cleaning up failed sandbox \"ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:46.002002 env[1734]: time="2024-12-13T14:33:46.001964101Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-888c7f5dd-6vnlq,Uid:dca070a3-4cd0-4f67-ba56-957513d4401c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:46.002517 env[1734]: time="2024-12-13T14:33:46.002269141Z" level=error msg="Failed to destroy network for sandbox \"518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:46.004400 env[1734]: time="2024-12-13T14:33:46.004337775Z" level=error msg="encountered an error cleaning up failed sandbox \"518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:46.004677 env[1734]: time="2024-12-13T14:33:46.004565220Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-7sbc7,Uid:74fcd6f9-93f1-4dfe-99ac-a1543b30279a,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:46.008195 kubelet[2802]: E1213 14:33:46.002427 2802 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:46.008876 kubelet[2802]: E1213 14:33:46.008309 2802 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-888c7f5dd-6vnlq" Dec 13 14:33:46.008876 kubelet[2802]: E1213 14:33:46.008347 2802 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-888c7f5dd-6vnlq" Dec 13 14:33:46.008876 kubelet[2802]: E1213 14:33:46.008419 2802 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-888c7f5dd-6vnlq_calico-system(dca070a3-4cd0-4f67-ba56-957513d4401c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-888c7f5dd-6vnlq_calico-system(dca070a3-4cd0-4f67-ba56-957513d4401c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-888c7f5dd-6vnlq" podUID="dca070a3-4cd0-4f67-ba56-957513d4401c" Dec 13 14:33:46.009804 kubelet[2802]: E1213 14:33:46.005001 2802 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:46.010174 kubelet[2802]: E1213 14:33:46.009838 2802 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-7sbc7" Dec 13 14:33:46.010174 kubelet[2802]: E1213 14:33:46.009873 2802 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-7sbc7" Dec 13 14:33:46.010393 kubelet[2802]: E1213 14:33:46.010171 2802 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-7sbc7_kube-system(74fcd6f9-93f1-4dfe-99ac-a1543b30279a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-7sbc7_kube-system(74fcd6f9-93f1-4dfe-99ac-a1543b30279a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-7sbc7" podUID="74fcd6f9-93f1-4dfe-99ac-a1543b30279a" Dec 13 14:33:46.017815 env[1734]: time="2024-12-13T14:33:46.017737653Z" level=error msg="Failed to destroy network for sandbox \"d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:46.018179 env[1734]: time="2024-12-13T14:33:46.018135716Z" level=error msg="encountered an error cleaning up failed sandbox \"d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:46.018273 env[1734]: time="2024-12-13T14:33:46.018195187Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-2hzrj,Uid:7abbd636-a28b-4594-90af-7cf85567b8ac,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:46.018488 kubelet[2802]: E1213 14:33:46.018453 2802 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:46.018593 kubelet[2802]: E1213 14:33:46.018511 2802 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-2hzrj" Dec 13 14:33:46.018593 kubelet[2802]: E1213 14:33:46.018538 2802 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-2hzrj" Dec 13 14:33:46.018691 kubelet[2802]: E1213 14:33:46.018591 2802 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-2hzrj_kube-system(7abbd636-a28b-4594-90af-7cf85567b8ac)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-2hzrj_kube-system(7abbd636-a28b-4594-90af-7cf85567b8ac)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-2hzrj" podUID="7abbd636-a28b-4594-90af-7cf85567b8ac" Dec 13 14:33:46.078225 kubelet[2802]: I1213 14:33:46.078193 2802 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" Dec 13 14:33:46.090738 kubelet[2802]: I1213 14:33:46.090319 2802 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" Dec 13 14:33:46.098464 env[1734]: time="2024-12-13T14:33:46.098331668Z" level=info msg="StopPodSandbox for \"518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f\"" Dec 13 14:33:46.099848 env[1734]: time="2024-12-13T14:33:46.098436021Z" level=info msg="StopPodSandbox for \"ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d\"" Dec 13 14:33:46.106416 env[1734]: time="2024-12-13T14:33:46.102040230Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:33:46.112403 kubelet[2802]: I1213 14:33:46.107897 2802 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" Dec 13 14:33:46.112574 env[1734]: time="2024-12-13T14:33:46.109430432Z" level=info msg="StopPodSandbox for \"d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4\"" Dec 13 14:33:46.184930 env[1734]: time="2024-12-13T14:33:46.184876108Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7cb8854c79-5mr9j,Uid:9f8354fa-b7b2-49de-ab0f-223918f4108f,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:33:46.185650 env[1734]: time="2024-12-13T14:33:46.185612941Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7cb8854c79-z24zd,Uid:ee4d2866-d469-4d0b-9e9f-6b3aa8e11102,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:33:46.270011 env[1734]: time="2024-12-13T14:33:46.269872857Z" level=error msg="StopPodSandbox for \"ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d\" failed" error="failed to destroy network for sandbox \"ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:46.284411 kubelet[2802]: E1213 14:33:46.284363 2802 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" Dec 13 14:33:46.284588 kubelet[2802]: E1213 14:33:46.284436 2802 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d"} Dec 13 14:33:46.284588 kubelet[2802]: E1213 14:33:46.284507 2802 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"dca070a3-4cd0-4f67-ba56-957513d4401c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:33:46.284588 kubelet[2802]: E1213 14:33:46.284536 2802 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"dca070a3-4cd0-4f67-ba56-957513d4401c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-888c7f5dd-6vnlq" podUID="dca070a3-4cd0-4f67-ba56-957513d4401c" Dec 13 14:33:46.292215 env[1734]: time="2024-12-13T14:33:46.292148684Z" level=error msg="StopPodSandbox for \"518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f\" failed" error="failed to destroy network for sandbox \"518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:46.292725 kubelet[2802]: E1213 14:33:46.292684 2802 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" Dec 13 14:33:46.292857 kubelet[2802]: E1213 14:33:46.292742 2802 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f"} Dec 13 14:33:46.292857 kubelet[2802]: E1213 14:33:46.292788 2802 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"74fcd6f9-93f1-4dfe-99ac-a1543b30279a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:33:46.292857 kubelet[2802]: E1213 14:33:46.292824 2802 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"74fcd6f9-93f1-4dfe-99ac-a1543b30279a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-7sbc7" podUID="74fcd6f9-93f1-4dfe-99ac-a1543b30279a" Dec 13 14:33:46.330475 env[1734]: time="2024-12-13T14:33:46.330172217Z" level=error msg="StopPodSandbox for \"d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4\" failed" error="failed to destroy network for sandbox \"d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:46.331416 kubelet[2802]: E1213 14:33:46.331090 2802 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" Dec 13 14:33:46.331416 kubelet[2802]: E1213 14:33:46.331177 2802 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4"} Dec 13 14:33:46.331416 kubelet[2802]: E1213 14:33:46.331249 2802 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7abbd636-a28b-4594-90af-7cf85567b8ac\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:33:46.331416 kubelet[2802]: E1213 14:33:46.331305 2802 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7abbd636-a28b-4594-90af-7cf85567b8ac\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-2hzrj" podUID="7abbd636-a28b-4594-90af-7cf85567b8ac" Dec 13 14:33:46.405598 env[1734]: time="2024-12-13T14:33:46.405533962Z" level=error msg="Failed to destroy network for sandbox \"b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:46.406442 env[1734]: time="2024-12-13T14:33:46.406395800Z" level=error msg="encountered an error cleaning up failed sandbox \"b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:46.406653 env[1734]: time="2024-12-13T14:33:46.406608346Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7cb8854c79-z24zd,Uid:ee4d2866-d469-4d0b-9e9f-6b3aa8e11102,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:46.409181 kubelet[2802]: E1213 14:33:46.407026 2802 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:46.409181 kubelet[2802]: E1213 14:33:46.407106 2802 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7cb8854c79-z24zd" Dec 13 14:33:46.409181 kubelet[2802]: E1213 14:33:46.407134 2802 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7cb8854c79-z24zd" Dec 13 14:33:46.409442 kubelet[2802]: E1213 14:33:46.407204 2802 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7cb8854c79-z24zd_calico-apiserver(ee4d2866-d469-4d0b-9e9f-6b3aa8e11102)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7cb8854c79-z24zd_calico-apiserver(ee4d2866-d469-4d0b-9e9f-6b3aa8e11102)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7cb8854c79-z24zd" podUID="ee4d2866-d469-4d0b-9e9f-6b3aa8e11102" Dec 13 14:33:46.417811 env[1734]: time="2024-12-13T14:33:46.417754175Z" level=error msg="Failed to destroy network for sandbox \"7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:46.418253 env[1734]: time="2024-12-13T14:33:46.418210106Z" level=error msg="encountered an error cleaning up failed sandbox \"7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:46.418560 env[1734]: time="2024-12-13T14:33:46.418274474Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7cb8854c79-5mr9j,Uid:9f8354fa-b7b2-49de-ab0f-223918f4108f,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:46.418750 kubelet[2802]: E1213 14:33:46.418678 2802 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:46.418893 kubelet[2802]: E1213 14:33:46.418825 2802 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7cb8854c79-5mr9j" Dec 13 14:33:46.418990 kubelet[2802]: E1213 14:33:46.418856 2802 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7cb8854c79-5mr9j" Dec 13 14:33:46.419176 kubelet[2802]: E1213 14:33:46.418987 2802 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7cb8854c79-5mr9j_calico-apiserver(9f8354fa-b7b2-49de-ab0f-223918f4108f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7cb8854c79-5mr9j_calico-apiserver(9f8354fa-b7b2-49de-ab0f-223918f4108f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7cb8854c79-5mr9j" podUID="9f8354fa-b7b2-49de-ab0f-223918f4108f" Dec 13 14:33:46.940992 systemd[1]: Created slice kubepods-besteffort-pod21bac09b_9db9_4cf7_814e_0d0853580069.slice. Dec 13 14:33:46.951650 env[1734]: time="2024-12-13T14:33:46.951524875Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x2vwj,Uid:21bac09b-9db9-4cf7-814e-0d0853580069,Namespace:calico-system,Attempt:0,}" Dec 13 14:33:47.052083 env[1734]: time="2024-12-13T14:33:47.052024007Z" level=error msg="Failed to destroy network for sandbox \"2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:47.052501 env[1734]: time="2024-12-13T14:33:47.052456055Z" level=error msg="encountered an error cleaning up failed sandbox \"2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:47.052610 env[1734]: time="2024-12-13T14:33:47.052524962Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x2vwj,Uid:21bac09b-9db9-4cf7-814e-0d0853580069,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:47.052813 kubelet[2802]: E1213 14:33:47.052772 2802 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:47.053349 kubelet[2802]: E1213 14:33:47.052853 2802 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-x2vwj" Dec 13 14:33:47.053349 kubelet[2802]: E1213 14:33:47.052884 2802 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-x2vwj" Dec 13 14:33:47.059943 kubelet[2802]: E1213 14:33:47.052967 2802 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-x2vwj_calico-system(21bac09b-9db9-4cf7-814e-0d0853580069)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-x2vwj_calico-system(21bac09b-9db9-4cf7-814e-0d0853580069)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-x2vwj" podUID="21bac09b-9db9-4cf7-814e-0d0853580069" Dec 13 14:33:47.085858 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e-shm.mount: Deactivated successfully. Dec 13 14:33:47.111475 kubelet[2802]: I1213 14:33:47.110724 2802 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" Dec 13 14:33:47.112372 env[1734]: time="2024-12-13T14:33:47.112310887Z" level=info msg="StopPodSandbox for \"2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87\"" Dec 13 14:33:47.112974 kubelet[2802]: I1213 14:33:47.112956 2802 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" Dec 13 14:33:47.114308 env[1734]: time="2024-12-13T14:33:47.114253856Z" level=info msg="StopPodSandbox for \"7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e\"" Dec 13 14:33:47.121987 kubelet[2802]: I1213 14:33:47.121948 2802 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" Dec 13 14:33:47.122930 env[1734]: time="2024-12-13T14:33:47.122892742Z" level=info msg="StopPodSandbox for \"b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c\"" Dec 13 14:33:47.255010 env[1734]: time="2024-12-13T14:33:47.254872686Z" level=error msg="StopPodSandbox for \"2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87\" failed" error="failed to destroy network for sandbox \"2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:47.256134 kubelet[2802]: E1213 14:33:47.255808 2802 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" Dec 13 14:33:47.256134 kubelet[2802]: E1213 14:33:47.255993 2802 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87"} Dec 13 14:33:47.256134 kubelet[2802]: E1213 14:33:47.256040 2802 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"21bac09b-9db9-4cf7-814e-0d0853580069\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:33:47.256134 kubelet[2802]: E1213 14:33:47.256084 2802 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"21bac09b-9db9-4cf7-814e-0d0853580069\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-x2vwj" podUID="21bac09b-9db9-4cf7-814e-0d0853580069" Dec 13 14:33:47.261477 env[1734]: time="2024-12-13T14:33:47.261410629Z" level=error msg="StopPodSandbox for \"b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c\" failed" error="failed to destroy network for sandbox \"b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:47.261712 kubelet[2802]: E1213 14:33:47.261663 2802 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" Dec 13 14:33:47.261878 kubelet[2802]: E1213 14:33:47.261801 2802 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c"} Dec 13 14:33:47.261878 kubelet[2802]: E1213 14:33:47.261850 2802 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ee4d2866-d469-4d0b-9e9f-6b3aa8e11102\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:33:47.262025 kubelet[2802]: E1213 14:33:47.261882 2802 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ee4d2866-d469-4d0b-9e9f-6b3aa8e11102\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7cb8854c79-z24zd" podUID="ee4d2866-d469-4d0b-9e9f-6b3aa8e11102" Dec 13 14:33:47.271089 env[1734]: time="2024-12-13T14:33:47.271022549Z" level=error msg="StopPodSandbox for \"7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e\" failed" error="failed to destroy network for sandbox \"7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:47.271804 kubelet[2802]: E1213 14:33:47.271590 2802 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" Dec 13 14:33:47.271804 kubelet[2802]: E1213 14:33:47.271663 2802 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e"} Dec 13 14:33:47.271804 kubelet[2802]: E1213 14:33:47.271707 2802 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9f8354fa-b7b2-49de-ab0f-223918f4108f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:33:47.271804 kubelet[2802]: E1213 14:33:47.271757 2802 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9f8354fa-b7b2-49de-ab0f-223918f4108f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7cb8854c79-5mr9j" podUID="9f8354fa-b7b2-49de-ab0f-223918f4108f" Dec 13 14:33:51.519903 kubelet[2802]: I1213 14:33:51.519432 2802 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:33:51.777000 audit[3875]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3875 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:51.779106 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:33:51.779177 kernel: audit: type=1325 audit(1734100431.777:1003): table=filter:95 family=2 entries=17 op=nft_register_rule pid=3875 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:51.777000 audit[3875]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffeb8bf6eb0 a2=0 a3=7ffeb8bf6e9c items=0 ppid=2933 pid=3875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:51.788483 kernel: audit: type=1300 audit(1734100431.777:1003): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffeb8bf6eb0 a2=0 a3=7ffeb8bf6e9c items=0 ppid=2933 pid=3875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:51.791792 kernel: audit: type=1327 audit(1734100431.777:1003): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:51.777000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:51.797596 kernel: audit: type=1325 audit(1734100431.793:1004): table=nat:96 family=2 entries=19 op=nft_register_chain pid=3875 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:51.793000 audit[3875]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3875 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:51.810296 kernel: audit: type=1300 audit(1734100431.793:1004): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffeb8bf6eb0 a2=0 a3=7ffeb8bf6e9c items=0 ppid=2933 pid=3875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:51.813539 kernel: audit: type=1327 audit(1734100431.793:1004): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:51.793000 audit[3875]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffeb8bf6eb0 a2=0 a3=7ffeb8bf6e9c items=0 ppid=2933 pid=3875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:51.793000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:54.703625 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3211204713.mount: Deactivated successfully. Dec 13 14:33:54.770454 env[1734]: time="2024-12-13T14:33:54.770405089Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:54.773414 env[1734]: time="2024-12-13T14:33:54.773362383Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:54.776448 env[1734]: time="2024-12-13T14:33:54.776169978Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:54.778828 env[1734]: time="2024-12-13T14:33:54.778769738Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:54.779972 env[1734]: time="2024-12-13T14:33:54.779931882Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:33:54.820051 env[1734]: time="2024-12-13T14:33:54.820004656Z" level=info msg="CreateContainer within sandbox \"4ad48fbdfec94c0eea145232236559e847a2d5f4f3f56e87e8fb6042ffe4fdae\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:33:54.894491 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount311275514.mount: Deactivated successfully. Dec 13 14:33:54.903554 env[1734]: time="2024-12-13T14:33:54.903462320Z" level=info msg="CreateContainer within sandbox \"4ad48fbdfec94c0eea145232236559e847a2d5f4f3f56e87e8fb6042ffe4fdae\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"d9690d5a0b6973eaa29d42a4592cdb85f7c694dd7cdbf83a1414e1abeea6b144\"" Dec 13 14:33:54.905621 env[1734]: time="2024-12-13T14:33:54.904731261Z" level=info msg="StartContainer for \"d9690d5a0b6973eaa29d42a4592cdb85f7c694dd7cdbf83a1414e1abeea6b144\"" Dec 13 14:33:54.935602 systemd[1]: Started cri-containerd-d9690d5a0b6973eaa29d42a4592cdb85f7c694dd7cdbf83a1414e1abeea6b144.scope. Dec 13 14:33:55.003838 kernel: audit: type=1400 audit(1734100434.993:1005): avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:55.004470 kernel: audit: type=1300 audit(1734100434.993:1005): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9915643cf8 items=0 ppid=3283 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:54.993000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.993000 audit[3887]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9915643cf8 items=0 ppid=3283 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:55.011628 kernel: audit: type=1327 audit(1734100434.993:1005): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439363930643561306236393733656161323964343261343539326364 Dec 13 14:33:55.017975 kernel: audit: type=1400 audit(1734100434.993:1006): avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439363930643561306236393733656161323964343261343539326364 Dec 13 14:33:54.993000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.993000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.993000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.993000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.993000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.993000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.993000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.993000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.993000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.993000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.993000 audit: BPF prog-id=136 op=LOAD Dec 13 14:33:54.993000 audit[3887]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00009d0d8 items=0 ppid=3283 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:54.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439363930643561306236393733656161323964343261343539326364 Dec 13 14:33:55.004000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:55.004000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:55.004000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:55.004000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:55.004000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:55.004000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:55.004000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:55.004000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:55.004000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:55.004000 audit: BPF prog-id=137 op=LOAD Dec 13 14:33:55.004000 audit[3887]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00009d128 items=0 ppid=3283 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:55.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439363930643561306236393733656161323964343261343539326364 Dec 13 14:33:55.010000 audit: BPF prog-id=137 op=UNLOAD Dec 13 14:33:55.010000 audit: BPF prog-id=136 op=UNLOAD Dec 13 14:33:55.011000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:55.011000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:55.011000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:55.011000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:55.011000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:55.011000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:55.011000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:55.011000 audit[3887]: AVC avc: denied { perfmon } for pid=3887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:55.011000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:55.011000 audit[3887]: AVC avc: denied { bpf } for pid=3887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:55.011000 audit: BPF prog-id=138 op=LOAD Dec 13 14:33:55.011000 audit[3887]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00009d1b8 items=0 ppid=3283 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:55.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439363930643561306236393733656161323964343261343539326364 Dec 13 14:33:55.051561 env[1734]: time="2024-12-13T14:33:55.051507996Z" level=info msg="StartContainer for \"d9690d5a0b6973eaa29d42a4592cdb85f7c694dd7cdbf83a1414e1abeea6b144\" returns successfully" Dec 13 14:33:55.195050 kubelet[2802]: I1213 14:33:55.188332 2802 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-p2thv" podStartSLOduration=1.445865607 podStartE2EDuration="23.183291679s" podCreationTimestamp="2024-12-13 14:33:32 +0000 UTC" firstStartedPulling="2024-12-13 14:33:33.043913119 +0000 UTC m=+21.486289471" lastFinishedPulling="2024-12-13 14:33:54.781339178 +0000 UTC m=+43.223715543" observedRunningTime="2024-12-13 14:33:55.176788325 +0000 UTC m=+43.619164699" watchObservedRunningTime="2024-12-13 14:33:55.183291679 +0000 UTC m=+43.625668053" Dec 13 14:33:55.682393 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:33:55.682899 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:33:57.305155 kernel: kauditd_printk_skb: 39 callbacks suppressed Dec 13 14:33:57.305323 kernel: audit: type=1400 audit(1734100437.289:1011): avc: denied { write } for pid=3978 comm="tee" name="fd" dev="proc" ino=25490 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:33:57.289000 audit[3978]: AVC avc: denied { write } for pid=3978 comm="tee" name="fd" dev="proc" ino=25490 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:33:57.328917 kernel: audit: type=1300 audit(1734100437.289:1011): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd70821a20 a2=241 a3=1b6 items=1 ppid=3955 pid=3978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:57.329083 kernel: audit: type=1307 audit(1734100437.289:1011): cwd="/etc/service/enabled/felix/log" Dec 13 14:33:57.329128 kernel: audit: type=1302 audit(1734100437.289:1011): item=0 name="/dev/fd/63" inode=25631 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:57.289000 audit[3978]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd70821a20 a2=241 a3=1b6 items=1 ppid=3955 pid=3978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:57.289000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:33:57.289000 audit: PATH item=0 name="/dev/fd/63" inode=25631 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:57.289000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:33:57.339746 kernel: audit: type=1327 audit(1734100437.289:1011): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:33:57.365000 audit[4006]: AVC avc: denied { write } for pid=4006 comm="tee" name="fd" dev="proc" ino=25503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:33:57.368000 audit[4009]: AVC avc: denied { write } for pid=4009 comm="tee" name="fd" dev="proc" ino=25681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:33:57.376346 kernel: audit: type=1400 audit(1734100437.365:1012): avc: denied { write } for pid=4006 comm="tee" name="fd" dev="proc" ino=25503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:33:57.377373 kernel: audit: type=1400 audit(1734100437.368:1013): avc: denied { write } for pid=4009 comm="tee" name="fd" dev="proc" ino=25681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:33:57.378311 kernel: audit: type=1300 audit(1734100437.368:1013): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdce164a20 a2=241 a3=1b6 items=1 ppid=3962 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:57.368000 audit[4009]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdce164a20 a2=241 a3=1b6 items=1 ppid=3962 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:57.368000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:33:57.386379 kernel: audit: type=1307 audit(1734100437.368:1013): cwd="/etc/service/enabled/bird6/log" Dec 13 14:33:57.368000 audit: PATH item=0 name="/dev/fd/63" inode=25670 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:57.393385 kernel: audit: type=1302 audit(1734100437.368:1013): item=0 name="/dev/fd/63" inode=25670 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:57.368000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:33:57.365000 audit[4006]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff8eb35a21 a2=241 a3=1b6 items=1 ppid=3958 pid=4006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:57.365000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:33:57.365000 audit: PATH item=0 name="/dev/fd/63" inode=25666 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:57.365000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:33:57.385000 audit[4017]: AVC avc: denied { write } for pid=4017 comm="tee" name="fd" dev="proc" ino=25687 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:33:57.385000 audit[4017]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd78cd9a22 a2=241 a3=1b6 items=1 ppid=3960 pid=4017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:57.385000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:33:57.385000 audit: PATH item=0 name="/dev/fd/63" inode=25499 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:57.385000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:33:57.419000 audit[4015]: AVC avc: denied { write } for pid=4015 comm="tee" name="fd" dev="proc" ino=25693 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:33:57.419000 audit[4015]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc393a6a10 a2=241 a3=1b6 items=1 ppid=3957 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:57.419000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:33:57.419000 audit: PATH item=0 name="/dev/fd/63" inode=25498 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:57.419000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:33:57.427000 audit[4026]: AVC avc: denied { write } for pid=4026 comm="tee" name="fd" dev="proc" ino=25505 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:33:57.427000 audit[4026]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd996d1a20 a2=241 a3=1b6 items=1 ppid=3964 pid=4026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:57.427000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:33:57.427000 audit: PATH item=0 name="/dev/fd/63" inode=25683 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:57.427000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:33:57.435000 audit[4019]: AVC avc: denied { write } for pid=4019 comm="tee" name="fd" dev="proc" ino=25509 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:33:57.435000 audit[4019]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff637aea11 a2=241 a3=1b6 items=1 ppid=3965 pid=4019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:57.435000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:33:57.435000 audit: PATH item=0 name="/dev/fd/63" inode=25500 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:57.435000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:33:57.940922 env[1734]: time="2024-12-13T14:33:57.940873707Z" level=info msg="StopPodSandbox for \"518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f\"" Dec 13 14:33:57.946753 env[1734]: time="2024-12-13T14:33:57.946709794Z" level=info msg="StopPodSandbox for \"ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d\"" Dec 13 14:33:57.980000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.980000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.980000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.980000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.980000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.980000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.980000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.980000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.980000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.980000 audit: BPF prog-id=139 op=LOAD Dec 13 14:33:57.980000 audit[4092]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff1b7de840 a2=98 a3=3 items=0 ppid=3956 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:57.980000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:57.980000 audit: BPF prog-id=139 op=UNLOAD Dec 13 14:33:57.982000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.982000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.982000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.982000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.982000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.982000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.982000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.982000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.982000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.982000 audit: BPF prog-id=140 op=LOAD Dec 13 14:33:57.982000 audit[4092]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff1b7de620 a2=74 a3=540051 items=0 ppid=3956 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:57.982000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:57.982000 audit: BPF prog-id=140 op=UNLOAD Dec 13 14:33:57.982000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.982000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.982000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.982000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.982000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.982000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.982000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.982000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.982000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:57.982000 audit: BPF prog-id=141 op=LOAD Dec 13 14:33:57.982000 audit[4092]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff1b7de650 a2=94 a3=2 items=0 ppid=3956 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:57.982000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:57.982000 audit: BPF prog-id=141 op=UNLOAD Dec 13 14:33:58.209000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.209000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.209000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.209000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.209000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.209000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.209000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.209000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.209000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.209000 audit: BPF prog-id=142 op=LOAD Dec 13 14:33:58.209000 audit[4092]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff1b7de510 a2=40 a3=1 items=0 ppid=3956 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.209000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:58.209000 audit: BPF prog-id=142 op=UNLOAD Dec 13 14:33:58.209000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.209000 audit[4092]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff1b7de5e0 a2=50 a3=7fff1b7de6c0 items=0 ppid=3956 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.209000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:58.222000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.222000 audit[4092]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1b7de520 a2=28 a3=0 items=0 ppid=3956 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.222000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:58.222000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.222000 audit[4092]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1b7de550 a2=28 a3=0 items=0 ppid=3956 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.222000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1b7de460 a2=28 a3=0 items=0 ppid=3956 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.223000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1b7de570 a2=28 a3=0 items=0 ppid=3956 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.223000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1b7de550 a2=28 a3=0 items=0 ppid=3956 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.223000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1b7de540 a2=28 a3=0 items=0 ppid=3956 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.223000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1b7de570 a2=28 a3=0 items=0 ppid=3956 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.223000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1b7de550 a2=28 a3=0 items=0 ppid=3956 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.223000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1b7de570 a2=28 a3=0 items=0 ppid=3956 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.223000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1b7de540 a2=28 a3=0 items=0 ppid=3956 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.223000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1b7de5b0 a2=28 a3=0 items=0 ppid=3956 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.223000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff1b7de360 a2=50 a3=1 items=0 ppid=3956 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.223000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit: BPF prog-id=143 op=LOAD Dec 13 14:33:58.223000 audit[4092]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff1b7de360 a2=94 a3=5 items=0 ppid=3956 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.223000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:58.223000 audit: BPF prog-id=143 op=UNLOAD Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff1b7de410 a2=50 a3=1 items=0 ppid=3956 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.223000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff1b7de530 a2=4 a3=38 items=0 ppid=3956 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.223000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.223000 audit[4092]: AVC avc: denied { confidentiality } for pid=4092 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:33:58.223000 audit[4092]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff1b7de580 a2=94 a3=6 items=0 ppid=3956 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.223000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:58.226000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.226000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.226000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.226000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.226000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.226000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.226000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.226000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.226000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.226000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.226000 audit[4092]: AVC avc: denied { confidentiality } for pid=4092 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:33:58.226000 audit[4092]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff1b7ddd30 a2=94 a3=83 items=0 ppid=3956 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.226000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:58.226000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.226000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.226000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.226000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.226000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.226000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.226000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.226000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.226000 audit[4092]: AVC avc: denied { perfmon } for pid=4092 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.226000 audit[4092]: AVC avc: denied { bpf } for pid=4092 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.226000 audit[4092]: AVC avc: denied { confidentiality } for pid=4092 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:33:58.226000 audit[4092]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff1b7ddd30 a2=94 a3=83 items=0 ppid=3956 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.226000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:58.246000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.246000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.246000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.246000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.246000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.246000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.246000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.246000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.246000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.246000 audit: BPF prog-id=144 op=LOAD Dec 13 14:33:58.246000 audit[4118]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff0b802380 a2=98 a3=1999999999999999 items=0 ppid=3956 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.246000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:33:58.246000 audit: BPF prog-id=144 op=UNLOAD Dec 13 14:33:58.246000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.246000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.246000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.246000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.246000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.246000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.246000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.246000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.246000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.246000 audit: BPF prog-id=145 op=LOAD Dec 13 14:33:58.246000 audit[4118]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff0b802260 a2=74 a3=ffff items=0 ppid=3956 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.246000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:33:58.246000 audit: BPF prog-id=145 op=UNLOAD Dec 13 14:33:58.246000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.246000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.246000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.246000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.246000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.246000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.246000 audit[4118]: AVC avc: denied { perfmon } for pid=4118 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.246000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.246000 audit[4118]: AVC avc: denied { bpf } for pid=4118 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.246000 audit: BPF prog-id=146 op=LOAD Dec 13 14:33:58.246000 audit[4118]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff0b8022a0 a2=40 a3=7fff0b802480 items=0 ppid=3956 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.246000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:33:58.246000 audit: BPF prog-id=146 op=UNLOAD Dec 13 14:33:58.372088 (udev-worker)[3921]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:33:58.381255 systemd-networkd[1456]: vxlan.calico: Link UP Dec 13 14:33:58.381261 systemd-networkd[1456]: vxlan.calico: Gained carrier Dec 13 14:33:58.541000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.541000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.541000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.541000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.541000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.541000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.541000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.541000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.541000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.541000 audit: BPF prog-id=147 op=LOAD Dec 13 14:33:58.541000 audit[4146]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd33c43190 a2=98 a3=ffffffff items=0 ppid=3956 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.541000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:58.542000 audit: BPF prog-id=147 op=UNLOAD Dec 13 14:33:58.542000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.542000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.542000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.542000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.542000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.542000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.542000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.542000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.542000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.542000 audit: BPF prog-id=148 op=LOAD Dec 13 14:33:58.542000 audit[4146]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd33c42fa0 a2=74 a3=540051 items=0 ppid=3956 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.542000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:58.543000 audit: BPF prog-id=148 op=UNLOAD Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit: BPF prog-id=149 op=LOAD Dec 13 14:33:58.543000 audit[4146]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd33c42fd0 a2=94 a3=2 items=0 ppid=3956 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.543000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:58.543000 audit: BPF prog-id=149 op=UNLOAD Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit[4146]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd33c42ea0 a2=28 a3=0 items=0 ppid=3956 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.543000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit[4146]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd33c42ed0 a2=28 a3=0 items=0 ppid=3956 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.543000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit[4146]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd33c42de0 a2=28 a3=0 items=0 ppid=3956 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.543000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit[4146]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd33c42ef0 a2=28 a3=0 items=0 ppid=3956 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.543000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit[4146]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd33c42ed0 a2=28 a3=0 items=0 ppid=3956 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.543000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit[4146]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd33c42ec0 a2=28 a3=0 items=0 ppid=3956 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.543000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit[4146]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd33c42ef0 a2=28 a3=0 items=0 ppid=3956 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.543000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit[4146]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd33c42ed0 a2=28 a3=0 items=0 ppid=3956 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.543000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit[4146]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd33c42ef0 a2=28 a3=0 items=0 ppid=3956 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.543000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit[4146]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd33c42ec0 a2=28 a3=0 items=0 ppid=3956 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.543000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit[4146]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd33c42f30 a2=28 a3=0 items=0 ppid=3956 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.543000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.543000 audit: BPF prog-id=150 op=LOAD Dec 13 14:33:58.543000 audit[4146]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd33c42da0 a2=40 a3=0 items=0 ppid=3956 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.543000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:58.543000 audit: BPF prog-id=150 op=UNLOAD Dec 13 14:33:58.544000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.544000 audit[4146]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd33c42d90 a2=50 a3=2800 items=0 ppid=3956 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.544000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:58.544000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.544000 audit[4146]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd33c42d90 a2=50 a3=2800 items=0 ppid=3956 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.544000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:58.544000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.544000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.544000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.544000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.544000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.544000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.544000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.544000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.544000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.544000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.544000 audit: BPF prog-id=151 op=LOAD Dec 13 14:33:58.544000 audit[4146]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd33c425b0 a2=94 a3=2 items=0 ppid=3956 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.544000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:58.544000 audit: BPF prog-id=151 op=UNLOAD Dec 13 14:33:58.544000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.544000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.544000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.544000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.544000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.544000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.544000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.544000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.544000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.544000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.544000 audit: BPF prog-id=152 op=LOAD Dec 13 14:33:58.544000 audit[4146]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd33c426b0 a2=94 a3=2d items=0 ppid=3956 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.544000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:58.549000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.549000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.549000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.549000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.549000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.549000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.549000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.549000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.549000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.549000 audit: BPF prog-id=153 op=LOAD Dec 13 14:33:58.549000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffbdc38080 a2=98 a3=0 items=0 ppid=3956 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.549000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:58.549000 audit: BPF prog-id=153 op=UNLOAD Dec 13 14:33:58.549000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.549000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.549000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.549000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.549000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.549000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.549000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.549000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.549000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.549000 audit: BPF prog-id=154 op=LOAD Dec 13 14:33:58.549000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffbdc37e60 a2=74 a3=540051 items=0 ppid=3956 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.549000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:58.550000 audit: BPF prog-id=154 op=UNLOAD Dec 13 14:33:58.550000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.550000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.550000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.550000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.550000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.550000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.550000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.550000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.550000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.550000 audit: BPF prog-id=155 op=LOAD Dec 13 14:33:58.550000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffbdc37e90 a2=94 a3=2 items=0 ppid=3956 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.550000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:58.550000 audit: BPF prog-id=155 op=UNLOAD Dec 13 14:33:58.566041 (udev-worker)[3920]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:33:58.752613 env[1734]: 2024-12-13 14:33:58.150 [INFO][4091] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" Dec 13 14:33:58.752613 env[1734]: 2024-12-13 14:33:58.153 [INFO][4091] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" iface="eth0" netns="/var/run/netns/cni-374836f1-5c78-7f4a-b0d2-ddebf21f4e04" Dec 13 14:33:58.752613 env[1734]: 2024-12-13 14:33:58.153 [INFO][4091] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" iface="eth0" netns="/var/run/netns/cni-374836f1-5c78-7f4a-b0d2-ddebf21f4e04" Dec 13 14:33:58.752613 env[1734]: 2024-12-13 14:33:58.155 [INFO][4091] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" iface="eth0" netns="/var/run/netns/cni-374836f1-5c78-7f4a-b0d2-ddebf21f4e04" Dec 13 14:33:58.752613 env[1734]: 2024-12-13 14:33:58.155 [INFO][4091] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" Dec 13 14:33:58.752613 env[1734]: 2024-12-13 14:33:58.155 [INFO][4091] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" Dec 13 14:33:58.752613 env[1734]: 2024-12-13 14:33:58.698 [INFO][4107] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" HandleID="k8s-pod-network.518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" Workload="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--7sbc7-eth0" Dec 13 14:33:58.752613 env[1734]: 2024-12-13 14:33:58.700 [INFO][4107] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:58.752613 env[1734]: 2024-12-13 14:33:58.700 [INFO][4107] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:58.752613 env[1734]: 2024-12-13 14:33:58.734 [WARNING][4107] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" HandleID="k8s-pod-network.518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" Workload="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--7sbc7-eth0" Dec 13 14:33:58.752613 env[1734]: 2024-12-13 14:33:58.734 [INFO][4107] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" HandleID="k8s-pod-network.518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" Workload="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--7sbc7-eth0" Dec 13 14:33:58.752613 env[1734]: 2024-12-13 14:33:58.736 [INFO][4107] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:58.752613 env[1734]: 2024-12-13 14:33:58.748 [INFO][4091] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" Dec 13 14:33:58.758246 systemd[1]: run-netns-cni\x2d374836f1\x2d5c78\x2d7f4a\x2db0d2\x2dddebf21f4e04.mount: Deactivated successfully. Dec 13 14:33:58.760965 env[1734]: time="2024-12-13T14:33:58.758343787Z" level=info msg="TearDown network for sandbox \"518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f\" successfully" Dec 13 14:33:58.760965 env[1734]: time="2024-12-13T14:33:58.758412220Z" level=info msg="StopPodSandbox for \"518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f\" returns successfully" Dec 13 14:33:58.771558 env[1734]: time="2024-12-13T14:33:58.771501371Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-7sbc7,Uid:74fcd6f9-93f1-4dfe-99ac-a1543b30279a,Namespace:kube-system,Attempt:1,}" Dec 13 14:33:58.774506 env[1734]: 2024-12-13 14:33:58.162 [INFO][4099] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" Dec 13 14:33:58.774506 env[1734]: 2024-12-13 14:33:58.163 [INFO][4099] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" iface="eth0" netns="/var/run/netns/cni-9355b5b8-da5c-e8c9-8cf6-52714d23a25b" Dec 13 14:33:58.774506 env[1734]: 2024-12-13 14:33:58.163 [INFO][4099] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" iface="eth0" netns="/var/run/netns/cni-9355b5b8-da5c-e8c9-8cf6-52714d23a25b" Dec 13 14:33:58.774506 env[1734]: 2024-12-13 14:33:58.164 [INFO][4099] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" iface="eth0" netns="/var/run/netns/cni-9355b5b8-da5c-e8c9-8cf6-52714d23a25b" Dec 13 14:33:58.774506 env[1734]: 2024-12-13 14:33:58.164 [INFO][4099] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" Dec 13 14:33:58.774506 env[1734]: 2024-12-13 14:33:58.164 [INFO][4099] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" Dec 13 14:33:58.774506 env[1734]: 2024-12-13 14:33:58.700 [INFO][4108] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" HandleID="k8s-pod-network.ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" Workload="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" Dec 13 14:33:58.774506 env[1734]: 2024-12-13 14:33:58.701 [INFO][4108] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:58.774506 env[1734]: 2024-12-13 14:33:58.737 [INFO][4108] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:58.774506 env[1734]: 2024-12-13 14:33:58.761 [WARNING][4108] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" HandleID="k8s-pod-network.ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" Workload="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" Dec 13 14:33:58.774506 env[1734]: 2024-12-13 14:33:58.761 [INFO][4108] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" HandleID="k8s-pod-network.ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" Workload="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" Dec 13 14:33:58.774506 env[1734]: 2024-12-13 14:33:58.764 [INFO][4108] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:58.774506 env[1734]: 2024-12-13 14:33:58.769 [INFO][4099] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" Dec 13 14:33:58.779228 systemd[1]: run-netns-cni\x2d9355b5b8\x2dda5c\x2de8c9\x2d8cf6\x2d52714d23a25b.mount: Deactivated successfully. Dec 13 14:33:58.780217 env[1734]: time="2024-12-13T14:33:58.780169446Z" level=info msg="TearDown network for sandbox \"ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d\" successfully" Dec 13 14:33:58.780329 env[1734]: time="2024-12-13T14:33:58.780311058Z" level=info msg="StopPodSandbox for \"ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d\" returns successfully" Dec 13 14:33:58.781470 env[1734]: time="2024-12-13T14:33:58.781435165Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-888c7f5dd-6vnlq,Uid:dca070a3-4cd0-4f67-ba56-957513d4401c,Namespace:calico-system,Attempt:1,}" Dec 13 14:33:58.805000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.805000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.805000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.805000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.805000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.805000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.805000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.805000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.805000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.805000 audit: BPF prog-id=156 op=LOAD Dec 13 14:33:58.805000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffbdc37d50 a2=40 a3=1 items=0 ppid=3956 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.805000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:58.806000 audit: BPF prog-id=156 op=UNLOAD Dec 13 14:33:58.806000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.806000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffbdc37e20 a2=50 a3=7fffbdc37f00 items=0 ppid=3956 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.806000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:58.827000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.827000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffbdc37d60 a2=28 a3=0 items=0 ppid=3956 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.827000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:58.827000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.827000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffbdc37d90 a2=28 a3=0 items=0 ppid=3956 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.827000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:58.827000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.827000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffbdc37ca0 a2=28 a3=0 items=0 ppid=3956 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.827000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:58.827000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.827000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffbdc37db0 a2=28 a3=0 items=0 ppid=3956 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.827000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:58.827000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.827000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffbdc37d90 a2=28 a3=0 items=0 ppid=3956 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.827000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:58.827000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.827000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffbdc37d80 a2=28 a3=0 items=0 ppid=3956 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.827000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:58.827000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.827000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffbdc37db0 a2=28 a3=0 items=0 ppid=3956 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.827000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:58.827000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.827000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffbdc37d90 a2=28 a3=0 items=0 ppid=3956 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.827000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:58.827000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.827000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffbdc37db0 a2=28 a3=0 items=0 ppid=3956 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.827000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:58.827000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.827000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffbdc37d80 a2=28 a3=0 items=0 ppid=3956 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.827000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:58.827000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.827000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffbdc37df0 a2=28 a3=0 items=0 ppid=3956 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.827000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:58.828000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.828000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffbdc37ba0 a2=50 a3=1 items=0 ppid=3956 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.828000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:58.828000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.828000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.828000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.828000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.828000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.828000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.828000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.828000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.828000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.828000 audit: BPF prog-id=157 op=LOAD Dec 13 14:33:58.828000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffbdc37ba0 a2=94 a3=5 items=0 ppid=3956 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.828000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:58.828000 audit: BPF prog-id=157 op=UNLOAD Dec 13 14:33:58.828000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.828000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffbdc37c50 a2=50 a3=1 items=0 ppid=3956 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.828000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:58.828000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.828000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffbdc37d70 a2=4 a3=38 items=0 ppid=3956 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.828000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:58.828000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.828000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.828000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.828000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.828000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.828000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.828000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.828000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.828000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.828000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.828000 audit[4148]: AVC avc: denied { confidentiality } for pid=4148 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:33:58.828000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffbdc37dc0 a2=94 a3=6 items=0 ppid=3956 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.828000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:58.829000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.829000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.829000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.829000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.829000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.829000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.829000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.829000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.829000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.829000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.829000 audit[4148]: AVC avc: denied { confidentiality } for pid=4148 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:33:58.829000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffbdc37570 a2=94 a3=83 items=0 ppid=3956 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.829000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:58.829000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.829000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.829000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.829000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.829000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.829000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.829000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.829000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.829000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.829000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.829000 audit[4148]: AVC avc: denied { confidentiality } for pid=4148 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:33:58.829000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffbdc37570 a2=94 a3=83 items=0 ppid=3956 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.829000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:58.830000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.830000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffbdc38fb0 a2=10 a3=f1f00800 items=0 ppid=3956 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.830000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:58.830000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.830000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffbdc38e50 a2=10 a3=3 items=0 ppid=3956 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.830000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:58.830000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.830000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffbdc38df0 a2=10 a3=3 items=0 ppid=3956 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.830000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:58.830000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:58.830000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffbdc38df0 a2=10 a3=7 items=0 ppid=3956 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:58.830000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:58.841000 audit: BPF prog-id=152 op=UNLOAD Dec 13 14:33:58.936916 env[1734]: time="2024-12-13T14:33:58.936841580Z" level=info msg="StopPodSandbox for \"b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c\"" Dec 13 14:33:58.938489 env[1734]: time="2024-12-13T14:33:58.937590241Z" level=info msg="StopPodSandbox for \"d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4\"" Dec 13 14:33:59.128000 audit[4247]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=4247 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:33:59.128000 audit[4247]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd3c2a3f40 a2=0 a3=7ffd3c2a3f2c items=0 ppid=3956 pid=4247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.128000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:33:59.170000 audit[4244]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=4244 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:33:59.170000 audit[4244]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffde42e9a90 a2=0 a3=7ffde42e9a7c items=0 ppid=3956 pid=4244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.170000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:33:59.181000 audit[4245]: NETFILTER_CFG table=raw:99 family=2 entries=21 op=nft_register_chain pid=4245 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:33:59.181000 audit[4245]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffcf2150d90 a2=0 a3=7ffcf2150d7c items=0 ppid=3956 pid=4245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.181000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:33:59.219000 audit[4256]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=4256 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:33:59.219000 audit[4256]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffd5a575cd0 a2=0 a3=7ffd5a575cbc items=0 ppid=3956 pid=4256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.219000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:33:59.406953 (udev-worker)[4151]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:33:59.411556 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidf721ab8188: link becomes ready Dec 13 14:33:59.409649 systemd-networkd[1456]: calidf721ab8188: Link UP Dec 13 14:33:59.411384 systemd-networkd[1456]: calidf721ab8188: Gained carrier Dec 13 14:33:59.445814 env[1734]: 2024-12-13 14:33:59.056 [INFO][4165] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--19--209-k8s-coredns--7db6d8ff4d--7sbc7-eth0 coredns-7db6d8ff4d- kube-system 74fcd6f9-93f1-4dfe-99ac-a1543b30279a 797 0 2024-12-13 14:33:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-19-209 coredns-7db6d8ff4d-7sbc7 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calidf721ab8188 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7sbc7" WorkloadEndpoint="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--7sbc7-" Dec 13 14:33:59.445814 env[1734]: 2024-12-13 14:33:59.056 [INFO][4165] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7sbc7" WorkloadEndpoint="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--7sbc7-eth0" Dec 13 14:33:59.445814 env[1734]: 2024-12-13 14:33:59.233 [INFO][4238] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1" HandleID="k8s-pod-network.3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1" Workload="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--7sbc7-eth0" Dec 13 14:33:59.445814 env[1734]: 2024-12-13 14:33:59.251 [INFO][4238] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1" HandleID="k8s-pod-network.3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1" Workload="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--7sbc7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002e6a20), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-19-209", "pod":"coredns-7db6d8ff4d-7sbc7", "timestamp":"2024-12-13 14:33:59.23355297 +0000 UTC"}, Hostname:"ip-172-31-19-209", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:33:59.445814 env[1734]: 2024-12-13 14:33:59.251 [INFO][4238] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:59.445814 env[1734]: 2024-12-13 14:33:59.251 [INFO][4238] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:59.445814 env[1734]: 2024-12-13 14:33:59.251 [INFO][4238] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-19-209' Dec 13 14:33:59.445814 env[1734]: 2024-12-13 14:33:59.261 [INFO][4238] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1" host="ip-172-31-19-209" Dec 13 14:33:59.445814 env[1734]: 2024-12-13 14:33:59.286 [INFO][4238] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-19-209" Dec 13 14:33:59.445814 env[1734]: 2024-12-13 14:33:59.333 [INFO][4238] ipam/ipam.go 489: Trying affinity for 192.168.66.64/26 host="ip-172-31-19-209" Dec 13 14:33:59.445814 env[1734]: 2024-12-13 14:33:59.339 [INFO][4238] ipam/ipam.go 155: Attempting to load block cidr=192.168.66.64/26 host="ip-172-31-19-209" Dec 13 14:33:59.445814 env[1734]: 2024-12-13 14:33:59.360 [INFO][4238] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.66.64/26 host="ip-172-31-19-209" Dec 13 14:33:59.445814 env[1734]: 2024-12-13 14:33:59.360 [INFO][4238] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.66.64/26 handle="k8s-pod-network.3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1" host="ip-172-31-19-209" Dec 13 14:33:59.445814 env[1734]: 2024-12-13 14:33:59.374 [INFO][4238] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1 Dec 13 14:33:59.445814 env[1734]: 2024-12-13 14:33:59.383 [INFO][4238] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.66.64/26 handle="k8s-pod-network.3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1" host="ip-172-31-19-209" Dec 13 14:33:59.445814 env[1734]: 2024-12-13 14:33:59.398 [INFO][4238] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.66.65/26] block=192.168.66.64/26 handle="k8s-pod-network.3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1" host="ip-172-31-19-209" Dec 13 14:33:59.445814 env[1734]: 2024-12-13 14:33:59.398 [INFO][4238] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.66.65/26] handle="k8s-pod-network.3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1" host="ip-172-31-19-209" Dec 13 14:33:59.445814 env[1734]: 2024-12-13 14:33:59.398 [INFO][4238] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:59.445814 env[1734]: 2024-12-13 14:33:59.398 [INFO][4238] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.65/26] IPv6=[] ContainerID="3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1" HandleID="k8s-pod-network.3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1" Workload="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--7sbc7-eth0" Dec 13 14:33:59.447575 env[1734]: 2024-12-13 14:33:59.401 [INFO][4165] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7sbc7" WorkloadEndpoint="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--7sbc7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--209-k8s-coredns--7db6d8ff4d--7sbc7-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"74fcd6f9-93f1-4dfe-99ac-a1543b30279a", ResourceVersion:"797", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-209", ContainerID:"", Pod:"coredns-7db6d8ff4d-7sbc7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.66.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calidf721ab8188", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:59.447575 env[1734]: 2024-12-13 14:33:59.402 [INFO][4165] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.66.65/32] ContainerID="3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7sbc7" WorkloadEndpoint="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--7sbc7-eth0" Dec 13 14:33:59.447575 env[1734]: 2024-12-13 14:33:59.402 [INFO][4165] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calidf721ab8188 ContainerID="3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7sbc7" WorkloadEndpoint="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--7sbc7-eth0" Dec 13 14:33:59.447575 env[1734]: 2024-12-13 14:33:59.413 [INFO][4165] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7sbc7" WorkloadEndpoint="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--7sbc7-eth0" Dec 13 14:33:59.447575 env[1734]: 2024-12-13 14:33:59.414 [INFO][4165] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7sbc7" WorkloadEndpoint="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--7sbc7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--209-k8s-coredns--7db6d8ff4d--7sbc7-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"74fcd6f9-93f1-4dfe-99ac-a1543b30279a", ResourceVersion:"797", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-209", ContainerID:"3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1", Pod:"coredns-7db6d8ff4d-7sbc7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.66.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calidf721ab8188", MAC:"2e:61:06:dc:0c:cc", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:59.447575 env[1734]: 2024-12-13 14:33:59.443 [INFO][4165] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7sbc7" WorkloadEndpoint="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--7sbc7-eth0" Dec 13 14:33:59.512000 audit[4284]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=4284 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:33:59.512000 audit[4284]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffecfb2a580 a2=0 a3=7ffecfb2a56c items=0 ppid=3956 pid=4284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.512000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:33:59.514472 systemd-networkd[1456]: vxlan.calico: Gained IPv6LL Dec 13 14:33:59.593692 systemd-networkd[1456]: calif77ca70f44f: Link UP Dec 13 14:33:59.597812 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:33:59.598022 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif77ca70f44f: link becomes ready Dec 13 14:33:59.596293 systemd-networkd[1456]: calif77ca70f44f: Gained carrier Dec 13 14:33:59.659662 env[1734]: 2024-12-13 14:33:59.056 [INFO][4162] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0 calico-kube-controllers-888c7f5dd- calico-system dca070a3-4cd0-4f67-ba56-957513d4401c 798 0 2024-12-13 14:33:32 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:888c7f5dd projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-19-209 calico-kube-controllers-888c7f5dd-6vnlq eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calif77ca70f44f [] []}} ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Namespace="calico-system" Pod="calico-kube-controllers-888c7f5dd-6vnlq" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-" Dec 13 14:33:59.659662 env[1734]: 2024-12-13 14:33:59.056 [INFO][4162] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Namespace="calico-system" Pod="calico-kube-controllers-888c7f5dd-6vnlq" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" Dec 13 14:33:59.659662 env[1734]: 2024-12-13 14:33:59.349 [INFO][4246] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" HandleID="k8s-pod-network.c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Workload="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" Dec 13 14:33:59.659662 env[1734]: 2024-12-13 14:33:59.397 [INFO][4246] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" HandleID="k8s-pod-network.c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Workload="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002e5f70), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-19-209", "pod":"calico-kube-controllers-888c7f5dd-6vnlq", "timestamp":"2024-12-13 14:33:59.34919988 +0000 UTC"}, Hostname:"ip-172-31-19-209", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:33:59.659662 env[1734]: 2024-12-13 14:33:59.397 [INFO][4246] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:59.659662 env[1734]: 2024-12-13 14:33:59.398 [INFO][4246] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:59.659662 env[1734]: 2024-12-13 14:33:59.398 [INFO][4246] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-19-209' Dec 13 14:33:59.659662 env[1734]: 2024-12-13 14:33:59.417 [INFO][4246] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" host="ip-172-31-19-209" Dec 13 14:33:59.659662 env[1734]: 2024-12-13 14:33:59.444 [INFO][4246] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-19-209" Dec 13 14:33:59.659662 env[1734]: 2024-12-13 14:33:59.454 [INFO][4246] ipam/ipam.go 489: Trying affinity for 192.168.66.64/26 host="ip-172-31-19-209" Dec 13 14:33:59.659662 env[1734]: 2024-12-13 14:33:59.459 [INFO][4246] ipam/ipam.go 155: Attempting to load block cidr=192.168.66.64/26 host="ip-172-31-19-209" Dec 13 14:33:59.659662 env[1734]: 2024-12-13 14:33:59.467 [INFO][4246] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.66.64/26 host="ip-172-31-19-209" Dec 13 14:33:59.659662 env[1734]: 2024-12-13 14:33:59.467 [INFO][4246] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.66.64/26 handle="k8s-pod-network.c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" host="ip-172-31-19-209" Dec 13 14:33:59.659662 env[1734]: 2024-12-13 14:33:59.470 [INFO][4246] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50 Dec 13 14:33:59.659662 env[1734]: 2024-12-13 14:33:59.482 [INFO][4246] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.66.64/26 handle="k8s-pod-network.c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" host="ip-172-31-19-209" Dec 13 14:33:59.659662 env[1734]: 2024-12-13 14:33:59.540 [INFO][4246] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.66.66/26] block=192.168.66.64/26 handle="k8s-pod-network.c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" host="ip-172-31-19-209" Dec 13 14:33:59.659662 env[1734]: 2024-12-13 14:33:59.540 [INFO][4246] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.66.66/26] handle="k8s-pod-network.c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" host="ip-172-31-19-209" Dec 13 14:33:59.659662 env[1734]: 2024-12-13 14:33:59.540 [INFO][4246] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:59.659662 env[1734]: 2024-12-13 14:33:59.540 [INFO][4246] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.66/26] IPv6=[] ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" HandleID="k8s-pod-network.c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Workload="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" Dec 13 14:33:59.660699 env[1734]: 2024-12-13 14:33:59.561 [INFO][4162] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Namespace="calico-system" Pod="calico-kube-controllers-888c7f5dd-6vnlq" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0", GenerateName:"calico-kube-controllers-888c7f5dd-", Namespace:"calico-system", SelfLink:"", UID:"dca070a3-4cd0-4f67-ba56-957513d4401c", ResourceVersion:"798", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"888c7f5dd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-209", ContainerID:"", Pod:"calico-kube-controllers-888c7f5dd-6vnlq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.66.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif77ca70f44f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:59.660699 env[1734]: 2024-12-13 14:33:59.561 [INFO][4162] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.66.66/32] ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Namespace="calico-system" Pod="calico-kube-controllers-888c7f5dd-6vnlq" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" Dec 13 14:33:59.660699 env[1734]: 2024-12-13 14:33:59.561 [INFO][4162] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif77ca70f44f ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Namespace="calico-system" Pod="calico-kube-controllers-888c7f5dd-6vnlq" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" Dec 13 14:33:59.660699 env[1734]: 2024-12-13 14:33:59.600 [INFO][4162] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Namespace="calico-system" Pod="calico-kube-controllers-888c7f5dd-6vnlq" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" Dec 13 14:33:59.660699 env[1734]: 2024-12-13 14:33:59.600 [INFO][4162] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Namespace="calico-system" Pod="calico-kube-controllers-888c7f5dd-6vnlq" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0", GenerateName:"calico-kube-controllers-888c7f5dd-", Namespace:"calico-system", SelfLink:"", UID:"dca070a3-4cd0-4f67-ba56-957513d4401c", ResourceVersion:"798", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"888c7f5dd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-209", ContainerID:"c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50", Pod:"calico-kube-controllers-888c7f5dd-6vnlq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.66.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif77ca70f44f", MAC:"ce:ec:c0:4f:c1:c3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:59.660699 env[1734]: 2024-12-13 14:33:59.641 [INFO][4162] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Namespace="calico-system" Pod="calico-kube-controllers-888c7f5dd-6vnlq" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" Dec 13 14:33:59.669766 env[1734]: 2024-12-13 14:33:59.228 [INFO][4222] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" Dec 13 14:33:59.669766 env[1734]: 2024-12-13 14:33:59.228 [INFO][4222] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" iface="eth0" netns="/var/run/netns/cni-e491dd34-bc99-6448-082b-b34aa3be2adf" Dec 13 14:33:59.669766 env[1734]: 2024-12-13 14:33:59.229 [INFO][4222] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" iface="eth0" netns="/var/run/netns/cni-e491dd34-bc99-6448-082b-b34aa3be2adf" Dec 13 14:33:59.669766 env[1734]: 2024-12-13 14:33:59.229 [INFO][4222] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" iface="eth0" netns="/var/run/netns/cni-e491dd34-bc99-6448-082b-b34aa3be2adf" Dec 13 14:33:59.669766 env[1734]: 2024-12-13 14:33:59.229 [INFO][4222] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" Dec 13 14:33:59.669766 env[1734]: 2024-12-13 14:33:59.229 [INFO][4222] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" Dec 13 14:33:59.669766 env[1734]: 2024-12-13 14:33:59.579 [INFO][4263] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" HandleID="k8s-pod-network.d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" Workload="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--2hzrj-eth0" Dec 13 14:33:59.669766 env[1734]: 2024-12-13 14:33:59.579 [INFO][4263] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:59.669766 env[1734]: 2024-12-13 14:33:59.579 [INFO][4263] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:59.669766 env[1734]: 2024-12-13 14:33:59.612 [WARNING][4263] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" HandleID="k8s-pod-network.d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" Workload="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--2hzrj-eth0" Dec 13 14:33:59.669766 env[1734]: 2024-12-13 14:33:59.612 [INFO][4263] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" HandleID="k8s-pod-network.d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" Workload="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--2hzrj-eth0" Dec 13 14:33:59.669766 env[1734]: 2024-12-13 14:33:59.619 [INFO][4263] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:59.669766 env[1734]: 2024-12-13 14:33:59.667 [INFO][4222] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" Dec 13 14:33:59.671215 env[1734]: time="2024-12-13T14:33:59.671165222Z" level=info msg="TearDown network for sandbox \"d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4\" successfully" Dec 13 14:33:59.671496 env[1734]: time="2024-12-13T14:33:59.671469633Z" level=info msg="StopPodSandbox for \"d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4\" returns successfully" Dec 13 14:33:59.675439 env[1734]: time="2024-12-13T14:33:59.675312207Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-2hzrj,Uid:7abbd636-a28b-4594-90af-7cf85567b8ac,Namespace:kube-system,Attempt:1,}" Dec 13 14:33:59.697000 audit[4306]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=4306 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:33:59.697000 audit[4306]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffe784725c0 a2=0 a3=7ffe784725ac items=0 ppid=3956 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.697000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:33:59.716657 env[1734]: time="2024-12-13T14:33:59.710081588Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:33:59.716657 env[1734]: time="2024-12-13T14:33:59.710139053Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:33:59.716657 env[1734]: time="2024-12-13T14:33:59.710154467Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:33:59.716657 env[1734]: time="2024-12-13T14:33:59.710372880Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1 pid=4311 runtime=io.containerd.runc.v2 Dec 13 14:33:59.733601 env[1734]: 2024-12-13 14:33:59.389 [INFO][4232] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" Dec 13 14:33:59.733601 env[1734]: 2024-12-13 14:33:59.389 [INFO][4232] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" iface="eth0" netns="/var/run/netns/cni-f75eb447-c357-0164-8beb-4429e0aefbc6" Dec 13 14:33:59.733601 env[1734]: 2024-12-13 14:33:59.389 [INFO][4232] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" iface="eth0" netns="/var/run/netns/cni-f75eb447-c357-0164-8beb-4429e0aefbc6" Dec 13 14:33:59.733601 env[1734]: 2024-12-13 14:33:59.390 [INFO][4232] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" iface="eth0" netns="/var/run/netns/cni-f75eb447-c357-0164-8beb-4429e0aefbc6" Dec 13 14:33:59.733601 env[1734]: 2024-12-13 14:33:59.390 [INFO][4232] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" Dec 13 14:33:59.733601 env[1734]: 2024-12-13 14:33:59.390 [INFO][4232] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" Dec 13 14:33:59.733601 env[1734]: 2024-12-13 14:33:59.708 [INFO][4272] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" HandleID="k8s-pod-network.b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" Workload="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--z24zd-eth0" Dec 13 14:33:59.733601 env[1734]: 2024-12-13 14:33:59.708 [INFO][4272] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:59.733601 env[1734]: 2024-12-13 14:33:59.709 [INFO][4272] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:59.733601 env[1734]: 2024-12-13 14:33:59.721 [WARNING][4272] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" HandleID="k8s-pod-network.b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" Workload="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--z24zd-eth0" Dec 13 14:33:59.733601 env[1734]: 2024-12-13 14:33:59.721 [INFO][4272] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" HandleID="k8s-pod-network.b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" Workload="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--z24zd-eth0" Dec 13 14:33:59.733601 env[1734]: 2024-12-13 14:33:59.723 [INFO][4272] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:59.733601 env[1734]: 2024-12-13 14:33:59.731 [INFO][4232] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" Dec 13 14:33:59.734400 env[1734]: time="2024-12-13T14:33:59.733764886Z" level=info msg="TearDown network for sandbox \"b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c\" successfully" Dec 13 14:33:59.734400 env[1734]: time="2024-12-13T14:33:59.733813060Z" level=info msg="StopPodSandbox for \"b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c\" returns successfully" Dec 13 14:33:59.734836 env[1734]: time="2024-12-13T14:33:59.734799562Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7cb8854c79-z24zd,Uid:ee4d2866-d469-4d0b-9e9f-6b3aa8e11102,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:33:59.745555 systemd[1]: Started cri-containerd-3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1.scope. Dec 13 14:33:59.762038 systemd[1]: run-netns-cni\x2df75eb447\x2dc357\x2d0164\x2d8beb\x2d4429e0aefbc6.mount: Deactivated successfully. Dec 13 14:33:59.762163 systemd[1]: run-netns-cni\x2de491dd34\x2dbc99\x2d6448\x2d082b\x2db34aa3be2adf.mount: Deactivated successfully. Dec 13 14:33:59.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.799000 audit: BPF prog-id=158 op=LOAD Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4311 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366636661623365333964656133343434373765343164313530393237 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4311 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366636661623365333964656133343434373765343164313530393237 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit: BPF prog-id=159 op=LOAD Dec 13 14:33:59.800000 audit[4323]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000281940 items=0 ppid=4311 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366636661623365333964656133343434373765343164313530393237 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit: BPF prog-id=160 op=LOAD Dec 13 14:33:59.800000 audit[4323]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000281988 items=0 ppid=4311 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366636661623365333964656133343434373765343164313530393237 Dec 13 14:33:59.800000 audit: BPF prog-id=160 op=UNLOAD Dec 13 14:33:59.800000 audit: BPF prog-id=159 op=UNLOAD Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { perfmon } for pid=4323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit[4323]: AVC avc: denied { bpf } for pid=4323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.800000 audit: BPF prog-id=161 op=LOAD Dec 13 14:33:59.800000 audit[4323]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000281d98 items=0 ppid=4311 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366636661623365333964656133343434373765343164313530393237 Dec 13 14:33:59.812077 env[1734]: time="2024-12-13T14:33:59.809924920Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:33:59.812077 env[1734]: time="2024-12-13T14:33:59.810058439Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:33:59.812077 env[1734]: time="2024-12-13T14:33:59.810092953Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:33:59.812077 env[1734]: time="2024-12-13T14:33:59.810520845Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50 pid=4356 runtime=io.containerd.runc.v2 Dec 13 14:33:59.902456 env[1734]: time="2024-12-13T14:33:59.902408674Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-7sbc7,Uid:74fcd6f9-93f1-4dfe-99ac-a1543b30279a,Namespace:kube-system,Attempt:1,} returns sandbox id \"3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1\"" Dec 13 14:33:59.907085 systemd[1]: Started cri-containerd-c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50.scope. Dec 13 14:33:59.929246 env[1734]: time="2024-12-13T14:33:59.923365785Z" level=info msg="CreateContainer within sandbox \"3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:33:59.937548 env[1734]: time="2024-12-13T14:33:59.936724253Z" level=info msg="StopPodSandbox for \"7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e\"" Dec 13 14:33:59.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.979000 audit: BPF prog-id=162 op=LOAD Dec 13 14:33:59.980000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.980000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4356 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353966616334336562636564633835396639383132383435396137 Dec 13 14:33:59.981000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.981000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4356 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353966616334336562636564633835396639383132383435396137 Dec 13 14:33:59.981000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.981000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.981000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.981000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.981000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.981000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.981000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.981000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.981000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.981000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.981000 audit: BPF prog-id=163 op=LOAD Dec 13 14:33:59.981000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024470 items=0 ppid=4356 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353966616334336562636564633835396639383132383435396137 Dec 13 14:33:59.982000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.982000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.982000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.982000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.982000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.982000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.982000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.982000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.982000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.982000 audit: BPF prog-id=164 op=LOAD Dec 13 14:33:59.982000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000244b8 items=0 ppid=4356 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353966616334336562636564633835396639383132383435396137 Dec 13 14:33:59.983000 audit: BPF prog-id=164 op=UNLOAD Dec 13 14:33:59.983000 audit: BPF prog-id=163 op=UNLOAD Dec 13 14:33:59.983000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.983000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.983000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.983000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.983000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.983000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.983000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.983000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.983000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.983000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:59.983000 audit: BPF prog-id=165 op=LOAD Dec 13 14:33:59.983000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000248c8 items=0 ppid=4356 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:59.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353966616334336562636564633835396639383132383435396137 Dec 13 14:33:59.989787 env[1734]: time="2024-12-13T14:33:59.989733997Z" level=info msg="CreateContainer within sandbox \"3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"b216aac7d13f77de1c452721cabfaccdfac3f9a70962639d0f2845f673f632f9\"" Dec 13 14:33:59.991312 env[1734]: time="2024-12-13T14:33:59.991265964Z" level=info msg="StartContainer for \"b216aac7d13f77de1c452721cabfaccdfac3f9a70962639d0f2845f673f632f9\"" Dec 13 14:34:00.293625 systemd[1]: Started cri-containerd-b216aac7d13f77de1c452721cabfaccdfac3f9a70962639d0f2845f673f632f9.scope. Dec 13 14:34:00.344897 env[1734]: time="2024-12-13T14:34:00.344829245Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-888c7f5dd-6vnlq,Uid:dca070a3-4cd0-4f67-ba56-957513d4401c,Namespace:calico-system,Attempt:1,} returns sandbox id \"c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50\"" Dec 13 14:34:00.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.352000 audit: BPF prog-id=166 op=LOAD Dec 13 14:34:00.354000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.354000 audit[4441]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4311 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232313661616337643133663737646531633435323732316361626661 Dec 13 14:34:00.355000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.355000 audit[4441]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4311 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232313661616337643133663737646531633435323732316361626661 Dec 13 14:34:00.355000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.355000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.355000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.355000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.355000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.355000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.355000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.355000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.355000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.355000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.355000 audit: BPF prog-id=167 op=LOAD Dec 13 14:34:00.355000 audit[4441]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000199680 items=0 ppid=4311 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232313661616337643133663737646531633435323732316361626661 Dec 13 14:34:00.356000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.356000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.356000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.356000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.356000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.356000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.356000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.356000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.356000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.356000 audit: BPF prog-id=168 op=LOAD Dec 13 14:34:00.356000 audit[4441]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001996c8 items=0 ppid=4311 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232313661616337643133663737646531633435323732316361626661 Dec 13 14:34:00.356000 audit: BPF prog-id=168 op=UNLOAD Dec 13 14:34:00.356000 audit: BPF prog-id=167 op=UNLOAD Dec 13 14:34:00.356000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.356000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.356000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.356000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.356000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.356000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.356000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.356000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.356000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.356000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.356000 audit: BPF prog-id=169 op=LOAD Dec 13 14:34:00.356000 audit[4441]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000199ad8 items=0 ppid=4311 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232313661616337643133663737646531633435323732316361626661 Dec 13 14:34:00.363004 env[1734]: time="2024-12-13T14:34:00.362961942Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 14:34:00.365780 systemd-networkd[1456]: cali2dacf473a0a: Link UP Dec 13 14:34:00.372882 systemd-networkd[1456]: cali2dacf473a0a: Gained carrier Dec 13 14:34:00.373468 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2dacf473a0a: link becomes ready Dec 13 14:34:00.412472 env[1734]: 2024-12-13 14:33:59.944 [INFO][4365] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--z24zd-eth0 calico-apiserver-7cb8854c79- calico-apiserver ee4d2866-d469-4d0b-9e9f-6b3aa8e11102 806 0 2024-12-13 14:33:33 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7cb8854c79 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-19-209 calico-apiserver-7cb8854c79-z24zd eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali2dacf473a0a [] []}} ContainerID="34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587" Namespace="calico-apiserver" Pod="calico-apiserver-7cb8854c79-z24zd" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--z24zd-" Dec 13 14:34:00.412472 env[1734]: 2024-12-13 14:33:59.953 [INFO][4365] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587" Namespace="calico-apiserver" Pod="calico-apiserver-7cb8854c79-z24zd" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--z24zd-eth0" Dec 13 14:34:00.412472 env[1734]: 2024-12-13 14:34:00.250 [INFO][4419] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587" HandleID="k8s-pod-network.34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587" Workload="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--z24zd-eth0" Dec 13 14:34:00.412472 env[1734]: 2024-12-13 14:34:00.270 [INFO][4419] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587" HandleID="k8s-pod-network.34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587" Workload="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--z24zd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00032fb80), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-19-209", "pod":"calico-apiserver-7cb8854c79-z24zd", "timestamp":"2024-12-13 14:34:00.249989402 +0000 UTC"}, Hostname:"ip-172-31-19-209", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:34:00.412472 env[1734]: 2024-12-13 14:34:00.271 [INFO][4419] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:00.412472 env[1734]: 2024-12-13 14:34:00.271 [INFO][4419] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:00.412472 env[1734]: 2024-12-13 14:34:00.271 [INFO][4419] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-19-209' Dec 13 14:34:00.412472 env[1734]: 2024-12-13 14:34:00.274 [INFO][4419] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587" host="ip-172-31-19-209" Dec 13 14:34:00.412472 env[1734]: 2024-12-13 14:34:00.281 [INFO][4419] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-19-209" Dec 13 14:34:00.412472 env[1734]: 2024-12-13 14:34:00.289 [INFO][4419] ipam/ipam.go 489: Trying affinity for 192.168.66.64/26 host="ip-172-31-19-209" Dec 13 14:34:00.412472 env[1734]: 2024-12-13 14:34:00.293 [INFO][4419] ipam/ipam.go 155: Attempting to load block cidr=192.168.66.64/26 host="ip-172-31-19-209" Dec 13 14:34:00.412472 env[1734]: 2024-12-13 14:34:00.308 [INFO][4419] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.66.64/26 host="ip-172-31-19-209" Dec 13 14:34:00.412472 env[1734]: 2024-12-13 14:34:00.308 [INFO][4419] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.66.64/26 handle="k8s-pod-network.34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587" host="ip-172-31-19-209" Dec 13 14:34:00.412472 env[1734]: 2024-12-13 14:34:00.316 [INFO][4419] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587 Dec 13 14:34:00.412472 env[1734]: 2024-12-13 14:34:00.325 [INFO][4419] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.66.64/26 handle="k8s-pod-network.34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587" host="ip-172-31-19-209" Dec 13 14:34:00.412472 env[1734]: 2024-12-13 14:34:00.337 [INFO][4419] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.66.67/26] block=192.168.66.64/26 handle="k8s-pod-network.34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587" host="ip-172-31-19-209" Dec 13 14:34:00.412472 env[1734]: 2024-12-13 14:34:00.337 [INFO][4419] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.66.67/26] handle="k8s-pod-network.34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587" host="ip-172-31-19-209" Dec 13 14:34:00.412472 env[1734]: 2024-12-13 14:34:00.337 [INFO][4419] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:00.412472 env[1734]: 2024-12-13 14:34:00.337 [INFO][4419] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.67/26] IPv6=[] ContainerID="34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587" HandleID="k8s-pod-network.34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587" Workload="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--z24zd-eth0" Dec 13 14:34:00.416000 env[1734]: 2024-12-13 14:34:00.341 [INFO][4365] cni-plugin/k8s.go 386: Populated endpoint ContainerID="34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587" Namespace="calico-apiserver" Pod="calico-apiserver-7cb8854c79-z24zd" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--z24zd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--z24zd-eth0", GenerateName:"calico-apiserver-7cb8854c79-", Namespace:"calico-apiserver", SelfLink:"", UID:"ee4d2866-d469-4d0b-9e9f-6b3aa8e11102", ResourceVersion:"806", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7cb8854c79", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-209", ContainerID:"", Pod:"calico-apiserver-7cb8854c79-z24zd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.66.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2dacf473a0a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:00.416000 env[1734]: 2024-12-13 14:34:00.341 [INFO][4365] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.66.67/32] ContainerID="34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587" Namespace="calico-apiserver" Pod="calico-apiserver-7cb8854c79-z24zd" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--z24zd-eth0" Dec 13 14:34:00.416000 env[1734]: 2024-12-13 14:34:00.341 [INFO][4365] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2dacf473a0a ContainerID="34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587" Namespace="calico-apiserver" Pod="calico-apiserver-7cb8854c79-z24zd" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--z24zd-eth0" Dec 13 14:34:00.416000 env[1734]: 2024-12-13 14:34:00.370 [INFO][4365] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587" Namespace="calico-apiserver" Pod="calico-apiserver-7cb8854c79-z24zd" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--z24zd-eth0" Dec 13 14:34:00.416000 env[1734]: 2024-12-13 14:34:00.385 [INFO][4365] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587" Namespace="calico-apiserver" Pod="calico-apiserver-7cb8854c79-z24zd" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--z24zd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--z24zd-eth0", GenerateName:"calico-apiserver-7cb8854c79-", Namespace:"calico-apiserver", SelfLink:"", UID:"ee4d2866-d469-4d0b-9e9f-6b3aa8e11102", ResourceVersion:"806", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7cb8854c79", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-209", ContainerID:"34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587", Pod:"calico-apiserver-7cb8854c79-z24zd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.66.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2dacf473a0a", MAC:"e6:de:aa:1f:b7:72", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:00.416000 env[1734]: 2024-12-13 14:34:00.406 [INFO][4365] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587" Namespace="calico-apiserver" Pod="calico-apiserver-7cb8854c79-z24zd" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--z24zd-eth0" Dec 13 14:34:00.416000 env[1734]: time="2024-12-13T14:34:00.414191021Z" level=info msg="StartContainer for \"b216aac7d13f77de1c452721cabfaccdfac3f9a70962639d0f2845f673f632f9\" returns successfully" Dec 13 14:34:00.477812 env[1734]: time="2024-12-13T14:34:00.474284500Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:34:00.477812 env[1734]: time="2024-12-13T14:34:00.474393696Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:34:00.477812 env[1734]: time="2024-12-13T14:34:00.474412526Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:34:00.477812 env[1734]: time="2024-12-13T14:34:00.474654322Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587 pid=4498 runtime=io.containerd.runc.v2 Dec 13 14:34:00.491000 audit[4496]: NETFILTER_CFG table=filter:103 family=2 entries=48 op=nft_register_chain pid=4496 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:00.497816 systemd[1]: Started cri-containerd-34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587.scope. Dec 13 14:34:00.491000 audit[4496]: SYSCALL arch=c000003e syscall=46 success=yes exit=25868 a0=3 a1=7ffe248f5200 a2=0 a3=7ffe248f51ec items=0 ppid=3956 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.491000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:00.511229 systemd-networkd[1456]: cali5656c22d1d7: Link UP Dec 13 14:34:00.514438 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5656c22d1d7: link becomes ready Dec 13 14:34:00.514710 systemd-networkd[1456]: cali5656c22d1d7: Gained carrier Dec 13 14:34:00.547205 env[1734]: 2024-12-13 14:33:59.945 [INFO][4316] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--19--209-k8s-coredns--7db6d8ff4d--2hzrj-eth0 coredns-7db6d8ff4d- kube-system 7abbd636-a28b-4594-90af-7cf85567b8ac 804 0 2024-12-13 14:33:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-19-209 coredns-7db6d8ff4d-2hzrj eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali5656c22d1d7 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-2hzrj" WorkloadEndpoint="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--2hzrj-" Dec 13 14:34:00.547205 env[1734]: 2024-12-13 14:33:59.946 [INFO][4316] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-2hzrj" WorkloadEndpoint="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--2hzrj-eth0" Dec 13 14:34:00.547205 env[1734]: 2024-12-13 14:34:00.369 [INFO][4418] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b" HandleID="k8s-pod-network.3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b" Workload="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--2hzrj-eth0" Dec 13 14:34:00.547205 env[1734]: 2024-12-13 14:34:00.395 [INFO][4418] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b" HandleID="k8s-pod-network.3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b" Workload="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--2hzrj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000398be0), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-19-209", "pod":"coredns-7db6d8ff4d-2hzrj", "timestamp":"2024-12-13 14:34:00.369737166 +0000 UTC"}, Hostname:"ip-172-31-19-209", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:34:00.547205 env[1734]: 2024-12-13 14:34:00.396 [INFO][4418] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:00.547205 env[1734]: 2024-12-13 14:34:00.396 [INFO][4418] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:00.547205 env[1734]: 2024-12-13 14:34:00.396 [INFO][4418] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-19-209' Dec 13 14:34:00.547205 env[1734]: 2024-12-13 14:34:00.407 [INFO][4418] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b" host="ip-172-31-19-209" Dec 13 14:34:00.547205 env[1734]: 2024-12-13 14:34:00.419 [INFO][4418] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-19-209" Dec 13 14:34:00.547205 env[1734]: 2024-12-13 14:34:00.431 [INFO][4418] ipam/ipam.go 489: Trying affinity for 192.168.66.64/26 host="ip-172-31-19-209" Dec 13 14:34:00.547205 env[1734]: 2024-12-13 14:34:00.441 [INFO][4418] ipam/ipam.go 155: Attempting to load block cidr=192.168.66.64/26 host="ip-172-31-19-209" Dec 13 14:34:00.547205 env[1734]: 2024-12-13 14:34:00.448 [INFO][4418] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.66.64/26 host="ip-172-31-19-209" Dec 13 14:34:00.547205 env[1734]: 2024-12-13 14:34:00.448 [INFO][4418] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.66.64/26 handle="k8s-pod-network.3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b" host="ip-172-31-19-209" Dec 13 14:34:00.547205 env[1734]: 2024-12-13 14:34:00.460 [INFO][4418] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b Dec 13 14:34:00.547205 env[1734]: 2024-12-13 14:34:00.467 [INFO][4418] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.66.64/26 handle="k8s-pod-network.3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b" host="ip-172-31-19-209" Dec 13 14:34:00.547205 env[1734]: 2024-12-13 14:34:00.487 [INFO][4418] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.66.68/26] block=192.168.66.64/26 handle="k8s-pod-network.3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b" host="ip-172-31-19-209" Dec 13 14:34:00.547205 env[1734]: 2024-12-13 14:34:00.487 [INFO][4418] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.66.68/26] handle="k8s-pod-network.3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b" host="ip-172-31-19-209" Dec 13 14:34:00.547205 env[1734]: 2024-12-13 14:34:00.487 [INFO][4418] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:00.547205 env[1734]: 2024-12-13 14:34:00.487 [INFO][4418] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.68/26] IPv6=[] ContainerID="3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b" HandleID="k8s-pod-network.3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b" Workload="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--2hzrj-eth0" Dec 13 14:34:00.548293 env[1734]: 2024-12-13 14:34:00.507 [INFO][4316] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-2hzrj" WorkloadEndpoint="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--2hzrj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--209-k8s-coredns--7db6d8ff4d--2hzrj-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"7abbd636-a28b-4594-90af-7cf85567b8ac", ResourceVersion:"804", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-209", ContainerID:"", Pod:"coredns-7db6d8ff4d-2hzrj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.66.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5656c22d1d7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:00.548293 env[1734]: 2024-12-13 14:34:00.508 [INFO][4316] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.66.68/32] ContainerID="3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-2hzrj" WorkloadEndpoint="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--2hzrj-eth0" Dec 13 14:34:00.548293 env[1734]: 2024-12-13 14:34:00.508 [INFO][4316] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5656c22d1d7 ContainerID="3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-2hzrj" WorkloadEndpoint="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--2hzrj-eth0" Dec 13 14:34:00.548293 env[1734]: 2024-12-13 14:34:00.511 [INFO][4316] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-2hzrj" WorkloadEndpoint="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--2hzrj-eth0" Dec 13 14:34:00.548293 env[1734]: 2024-12-13 14:34:00.512 [INFO][4316] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-2hzrj" WorkloadEndpoint="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--2hzrj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--209-k8s-coredns--7db6d8ff4d--2hzrj-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"7abbd636-a28b-4594-90af-7cf85567b8ac", ResourceVersion:"804", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-209", ContainerID:"3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b", Pod:"coredns-7db6d8ff4d-2hzrj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.66.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5656c22d1d7", MAC:"36:28:c7:46:3f:fd", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:00.548293 env[1734]: 2024-12-13 14:34:00.541 [INFO][4316] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-2hzrj" WorkloadEndpoint="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--2hzrj-eth0" Dec 13 14:34:00.576818 systemd-networkd[1456]: calidf721ab8188: Gained IPv6LL Dec 13 14:34:00.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.606000 audit: BPF prog-id=170 op=LOAD Dec 13 14:34:00.607000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.607000 audit[4509]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4498 pid=4509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334333632623235326232666438343661373530376333323462636537 Dec 13 14:34:00.607000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.607000 audit[4509]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4498 pid=4509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334333632623235326232666438343661373530376333323462636537 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit: BPF prog-id=171 op=LOAD Dec 13 14:34:00.608000 audit[4509]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00033c880 items=0 ppid=4498 pid=4509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334333632623235326232666438343661373530376333323462636537 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit: BPF prog-id=172 op=LOAD Dec 13 14:34:00.608000 audit[4509]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00033c8c8 items=0 ppid=4498 pid=4509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334333632623235326232666438343661373530376333323462636537 Dec 13 14:34:00.608000 audit: BPF prog-id=172 op=UNLOAD Dec 13 14:34:00.608000 audit: BPF prog-id=171 op=UNLOAD Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.608000 audit: BPF prog-id=173 op=LOAD Dec 13 14:34:00.608000 audit[4509]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00033ccd8 items=0 ppid=4498 pid=4509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334333632623235326232666438343661373530376333323462636537 Dec 13 14:34:00.610000 audit[4548]: NETFILTER_CFG table=filter:104 family=2 entries=38 op=nft_register_chain pid=4548 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:00.610000 audit[4548]: SYSCALL arch=c000003e syscall=46 success=yes exit=19408 a0=3 a1=7ffdaa0a3330 a2=0 a3=7ffdaa0a331c items=0 ppid=3956 pid=4548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.610000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:00.678323 env[1734]: time="2024-12-13T14:34:00.672039437Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:34:00.678323 env[1734]: time="2024-12-13T14:34:00.672120630Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:34:00.678323 env[1734]: time="2024-12-13T14:34:00.672136809Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:34:00.678323 env[1734]: time="2024-12-13T14:34:00.672657335Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b pid=4558 runtime=io.containerd.runc.v2 Dec 13 14:34:00.693160 env[1734]: 2024-12-13 14:34:00.478 [INFO][4442] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" Dec 13 14:34:00.693160 env[1734]: 2024-12-13 14:34:00.478 [INFO][4442] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" iface="eth0" netns="/var/run/netns/cni-009d713d-b0d5-cb07-5df3-49308f676dca" Dec 13 14:34:00.693160 env[1734]: 2024-12-13 14:34:00.479 [INFO][4442] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" iface="eth0" netns="/var/run/netns/cni-009d713d-b0d5-cb07-5df3-49308f676dca" Dec 13 14:34:00.693160 env[1734]: 2024-12-13 14:34:00.479 [INFO][4442] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" iface="eth0" netns="/var/run/netns/cni-009d713d-b0d5-cb07-5df3-49308f676dca" Dec 13 14:34:00.693160 env[1734]: 2024-12-13 14:34:00.479 [INFO][4442] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" Dec 13 14:34:00.693160 env[1734]: 2024-12-13 14:34:00.479 [INFO][4442] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" Dec 13 14:34:00.693160 env[1734]: 2024-12-13 14:34:00.645 [INFO][4511] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" HandleID="k8s-pod-network.7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" Workload="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--5mr9j-eth0" Dec 13 14:34:00.693160 env[1734]: 2024-12-13 14:34:00.645 [INFO][4511] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:00.693160 env[1734]: 2024-12-13 14:34:00.645 [INFO][4511] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:00.693160 env[1734]: 2024-12-13 14:34:00.655 [WARNING][4511] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" HandleID="k8s-pod-network.7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" Workload="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--5mr9j-eth0" Dec 13 14:34:00.693160 env[1734]: 2024-12-13 14:34:00.655 [INFO][4511] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" HandleID="k8s-pod-network.7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" Workload="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--5mr9j-eth0" Dec 13 14:34:00.693160 env[1734]: 2024-12-13 14:34:00.678 [INFO][4511] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:00.693160 env[1734]: 2024-12-13 14:34:00.689 [INFO][4442] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" Dec 13 14:34:00.699603 env[1734]: time="2024-12-13T14:34:00.693960434Z" level=info msg="TearDown network for sandbox \"7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e\" successfully" Dec 13 14:34:00.699603 env[1734]: time="2024-12-13T14:34:00.694003776Z" level=info msg="StopPodSandbox for \"7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e\" returns successfully" Dec 13 14:34:00.700717 env[1734]: time="2024-12-13T14:34:00.700674964Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7cb8854c79-5mr9j,Uid:9f8354fa-b7b2-49de-ab0f-223918f4108f,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:34:00.720875 systemd[1]: Started cri-containerd-3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b.scope. Dec 13 14:34:00.780762 systemd[1]: run-containerd-runc-k8s.io-c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50-runc.7y1FMn.mount: Deactivated successfully. Dec 13 14:34:00.780918 systemd[1]: run-netns-cni\x2d009d713d\x2db0d5\x2dcb07\x2d5df3\x2d49308f676dca.mount: Deactivated successfully. Dec 13 14:34:00.784900 env[1734]: time="2024-12-13T14:34:00.783974225Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7cb8854c79-z24zd,Uid:ee4d2866-d469-4d0b-9e9f-6b3aa8e11102,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587\"" Dec 13 14:34:00.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.795000 audit: BPF prog-id=174 op=LOAD Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4558 pid=4565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332373861616132396264323136633165353734623066366561353262 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4558 pid=4565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332373861616132396264323136633165353734623066366561353262 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit: BPF prog-id=175 op=LOAD Dec 13 14:34:00.797000 audit[4565]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c6cb0 items=0 ppid=4558 pid=4565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332373861616132396264323136633165353734623066366561353262 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit: BPF prog-id=176 op=LOAD Dec 13 14:34:00.797000 audit[4565]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c6cf8 items=0 ppid=4558 pid=4565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332373861616132396264323136633165353734623066366561353262 Dec 13 14:34:00.797000 audit: BPF prog-id=176 op=UNLOAD Dec 13 14:34:00.797000 audit: BPF prog-id=175 op=UNLOAD Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:00.797000 audit: BPF prog-id=177 op=LOAD Dec 13 14:34:00.797000 audit[4565]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c7108 items=0 ppid=4558 pid=4565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:00.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332373861616132396264323136633165353734623066366561353262 Dec 13 14:34:00.866394 env[1734]: time="2024-12-13T14:34:00.866332956Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-2hzrj,Uid:7abbd636-a28b-4594-90af-7cf85567b8ac,Namespace:kube-system,Attempt:1,} returns sandbox id \"3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b\"" Dec 13 14:34:00.876177 env[1734]: time="2024-12-13T14:34:00.874669725Z" level=info msg="CreateContainer within sandbox \"3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:34:00.911700 env[1734]: time="2024-12-13T14:34:00.905033402Z" level=info msg="CreateContainer within sandbox \"3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"342792c7006c41884ffa309c7ba0e5fe997d2618fa0ed3e4ac466a9191b37fa8\"" Dec 13 14:34:00.911700 env[1734]: time="2024-12-13T14:34:00.908970645Z" level=info msg="StartContainer for \"342792c7006c41884ffa309c7ba0e5fe997d2618fa0ed3e4ac466a9191b37fa8\"" Dec 13 14:34:01.009703 systemd[1]: Started cri-containerd-342792c7006c41884ffa309c7ba0e5fe997d2618fa0ed3e4ac466a9191b37fa8.scope. Dec 13 14:34:01.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.112000 audit: BPF prog-id=178 op=LOAD Dec 13 14:34:01.114000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.114000 audit[4625]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4558 pid=4625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334323739326337303036633431383834666661333039633762613065 Dec 13 14:34:01.114000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.114000 audit[4625]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4558 pid=4625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334323739326337303036633431383834666661333039633762613065 Dec 13 14:34:01.114000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.114000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.114000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.114000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.114000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.114000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.114000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.114000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.114000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.114000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.114000 audit: BPF prog-id=179 op=LOAD Dec 13 14:34:01.114000 audit[4625]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003bc8b0 items=0 ppid=4558 pid=4625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334323739326337303036633431383834666661333039633762613065 Dec 13 14:34:01.114000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.114000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.114000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.114000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.114000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.114000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.114000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.114000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.114000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.114000 audit: BPF prog-id=180 op=LOAD Dec 13 14:34:01.114000 audit[4625]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003bc8f8 items=0 ppid=4558 pid=4625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334323739326337303036633431383834666661333039633762613065 Dec 13 14:34:01.121000 audit: BPF prog-id=180 op=UNLOAD Dec 13 14:34:01.122000 audit: BPF prog-id=179 op=UNLOAD Dec 13 14:34:01.122000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.122000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.122000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.122000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.122000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.122000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.122000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.122000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.122000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.122000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.122000 audit: BPF prog-id=181 op=LOAD Dec 13 14:34:01.122000 audit[4625]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003bcd08 items=0 ppid=4558 pid=4625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334323739326337303036633431383834666661333039633762613065 Dec 13 14:34:01.178552 env[1734]: time="2024-12-13T14:34:01.178495559Z" level=info msg="StartContainer for \"342792c7006c41884ffa309c7ba0e5fe997d2618fa0ed3e4ac466a9191b37fa8\" returns successfully" Dec 13 14:34:01.322794 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:34:01.322907 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie0837a2e29a: link becomes ready Dec 13 14:34:01.323112 systemd-networkd[1456]: calie0837a2e29a: Link UP Dec 13 14:34:01.323477 systemd-networkd[1456]: calie0837a2e29a: Gained carrier Dec 13 14:34:01.372043 kubelet[2802]: I1213 14:34:01.371974 2802 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-2hzrj" podStartSLOduration=37.371951035 podStartE2EDuration="37.371951035s" podCreationTimestamp="2024-12-13 14:33:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:34:01.327694709 +0000 UTC m=+49.770071084" watchObservedRunningTime="2024-12-13 14:34:01.371951035 +0000 UTC m=+49.814327409" Dec 13 14:34:01.378927 env[1734]: 2024-12-13 14:34:00.883 [INFO][4585] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--5mr9j-eth0 calico-apiserver-7cb8854c79- calico-apiserver 9f8354fa-b7b2-49de-ab0f-223918f4108f 822 0 2024-12-13 14:33:33 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7cb8854c79 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-19-209 calico-apiserver-7cb8854c79-5mr9j eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calie0837a2e29a [] []}} ContainerID="9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d" Namespace="calico-apiserver" Pod="calico-apiserver-7cb8854c79-5mr9j" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--5mr9j-" Dec 13 14:34:01.378927 env[1734]: 2024-12-13 14:34:00.883 [INFO][4585] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d" Namespace="calico-apiserver" Pod="calico-apiserver-7cb8854c79-5mr9j" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--5mr9j-eth0" Dec 13 14:34:01.378927 env[1734]: 2024-12-13 14:34:00.972 [INFO][4612] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d" HandleID="k8s-pod-network.9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d" Workload="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--5mr9j-eth0" Dec 13 14:34:01.378927 env[1734]: 2024-12-13 14:34:01.012 [INFO][4612] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d" HandleID="k8s-pod-network.9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d" Workload="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--5mr9j-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000310960), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-19-209", "pod":"calico-apiserver-7cb8854c79-5mr9j", "timestamp":"2024-12-13 14:34:00.9720109 +0000 UTC"}, Hostname:"ip-172-31-19-209", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:34:01.378927 env[1734]: 2024-12-13 14:34:01.012 [INFO][4612] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:01.378927 env[1734]: 2024-12-13 14:34:01.012 [INFO][4612] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:01.378927 env[1734]: 2024-12-13 14:34:01.012 [INFO][4612] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-19-209' Dec 13 14:34:01.378927 env[1734]: 2024-12-13 14:34:01.022 [INFO][4612] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d" host="ip-172-31-19-209" Dec 13 14:34:01.378927 env[1734]: 2024-12-13 14:34:01.051 [INFO][4612] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-19-209" Dec 13 14:34:01.378927 env[1734]: 2024-12-13 14:34:01.079 [INFO][4612] ipam/ipam.go 489: Trying affinity for 192.168.66.64/26 host="ip-172-31-19-209" Dec 13 14:34:01.378927 env[1734]: 2024-12-13 14:34:01.094 [INFO][4612] ipam/ipam.go 155: Attempting to load block cidr=192.168.66.64/26 host="ip-172-31-19-209" Dec 13 14:34:01.378927 env[1734]: 2024-12-13 14:34:01.101 [INFO][4612] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.66.64/26 host="ip-172-31-19-209" Dec 13 14:34:01.378927 env[1734]: 2024-12-13 14:34:01.101 [INFO][4612] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.66.64/26 handle="k8s-pod-network.9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d" host="ip-172-31-19-209" Dec 13 14:34:01.378927 env[1734]: 2024-12-13 14:34:01.107 [INFO][4612] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d Dec 13 14:34:01.378927 env[1734]: 2024-12-13 14:34:01.142 [INFO][4612] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.66.64/26 handle="k8s-pod-network.9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d" host="ip-172-31-19-209" Dec 13 14:34:01.378927 env[1734]: 2024-12-13 14:34:01.166 [INFO][4612] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.66.69/26] block=192.168.66.64/26 handle="k8s-pod-network.9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d" host="ip-172-31-19-209" Dec 13 14:34:01.378927 env[1734]: 2024-12-13 14:34:01.166 [INFO][4612] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.66.69/26] handle="k8s-pod-network.9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d" host="ip-172-31-19-209" Dec 13 14:34:01.378927 env[1734]: 2024-12-13 14:34:01.166 [INFO][4612] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:01.378927 env[1734]: 2024-12-13 14:34:01.166 [INFO][4612] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.69/26] IPv6=[] ContainerID="9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d" HandleID="k8s-pod-network.9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d" Workload="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--5mr9j-eth0" Dec 13 14:34:01.382785 env[1734]: 2024-12-13 14:34:01.179 [INFO][4585] cni-plugin/k8s.go 386: Populated endpoint ContainerID="9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d" Namespace="calico-apiserver" Pod="calico-apiserver-7cb8854c79-5mr9j" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--5mr9j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--5mr9j-eth0", GenerateName:"calico-apiserver-7cb8854c79-", Namespace:"calico-apiserver", SelfLink:"", UID:"9f8354fa-b7b2-49de-ab0f-223918f4108f", ResourceVersion:"822", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7cb8854c79", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-209", ContainerID:"", Pod:"calico-apiserver-7cb8854c79-5mr9j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.66.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie0837a2e29a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:01.382785 env[1734]: 2024-12-13 14:34:01.179 [INFO][4585] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.66.69/32] ContainerID="9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d" Namespace="calico-apiserver" Pod="calico-apiserver-7cb8854c79-5mr9j" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--5mr9j-eth0" Dec 13 14:34:01.382785 env[1734]: 2024-12-13 14:34:01.179 [INFO][4585] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie0837a2e29a ContainerID="9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d" Namespace="calico-apiserver" Pod="calico-apiserver-7cb8854c79-5mr9j" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--5mr9j-eth0" Dec 13 14:34:01.382785 env[1734]: 2024-12-13 14:34:01.323 [INFO][4585] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d" Namespace="calico-apiserver" Pod="calico-apiserver-7cb8854c79-5mr9j" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--5mr9j-eth0" Dec 13 14:34:01.382785 env[1734]: 2024-12-13 14:34:01.324 [INFO][4585] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d" Namespace="calico-apiserver" Pod="calico-apiserver-7cb8854c79-5mr9j" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--5mr9j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--5mr9j-eth0", GenerateName:"calico-apiserver-7cb8854c79-", Namespace:"calico-apiserver", SelfLink:"", UID:"9f8354fa-b7b2-49de-ab0f-223918f4108f", ResourceVersion:"822", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7cb8854c79", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-209", ContainerID:"9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d", Pod:"calico-apiserver-7cb8854c79-5mr9j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.66.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie0837a2e29a", MAC:"06:b5:6a:6b:aa:39", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:01.382785 env[1734]: 2024-12-13 14:34:01.375 [INFO][4585] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d" Namespace="calico-apiserver" Pod="calico-apiserver-7cb8854c79-5mr9j" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--5mr9j-eth0" Dec 13 14:34:01.412658 systemd-networkd[1456]: calif77ca70f44f: Gained IPv6LL Dec 13 14:34:01.631000 audit[4676]: NETFILTER_CFG table=filter:105 family=2 entries=46 op=nft_register_chain pid=4676 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:01.631000 audit[4676]: SYSCALL arch=c000003e syscall=46 success=yes exit=23892 a0=3 a1=7ffee4ad8cb0 a2=0 a3=7ffee4ad8c9c items=0 ppid=3956 pid=4676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.631000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:01.663000 audit[4675]: NETFILTER_CFG table=filter:106 family=2 entries=16 op=nft_register_rule pid=4675 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:01.663000 audit[4675]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff35268150 a2=0 a3=7fff3526813c items=0 ppid=2933 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.663000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:01.685000 audit[4675]: NETFILTER_CFG table=nat:107 family=2 entries=14 op=nft_register_rule pid=4675 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:01.685000 audit[4675]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff35268150 a2=0 a3=0 items=0 ppid=2933 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.685000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:01.707000 audit[4687]: NETFILTER_CFG table=filter:108 family=2 entries=16 op=nft_register_rule pid=4687 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:01.707000 audit[4687]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fffd19383e0 a2=0 a3=7fffd19383cc items=0 ppid=2933 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.707000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:01.711076 env[1734]: time="2024-12-13T14:34:01.710990791Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:34:01.711000 audit[4687]: NETFILTER_CFG table=nat:109 family=2 entries=14 op=nft_register_rule pid=4687 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:01.711000 audit[4687]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffd19383e0 a2=0 a3=0 items=0 ppid=2933 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.711000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:01.713419 env[1734]: time="2024-12-13T14:34:01.713308924Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:34:01.713419 env[1734]: time="2024-12-13T14:34:01.713343235Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:34:01.713886 env[1734]: time="2024-12-13T14:34:01.713808210Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d pid=4682 runtime=io.containerd.runc.v2 Dec 13 14:34:01.744572 systemd[1]: Started cri-containerd-9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d.scope. Dec 13 14:34:01.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.797000 audit: BPF prog-id=182 op=LOAD Dec 13 14:34:01.797576 systemd-networkd[1456]: cali2dacf473a0a: Gained IPv6LL Dec 13 14:34:01.798000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.798000 audit[4694]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4682 pid=4694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965346630633066323432376366333430626332393965386231373236 Dec 13 14:34:01.798000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.798000 audit[4694]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=4682 pid=4694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965346630633066323432376366333430626332393965386231373236 Dec 13 14:34:01.798000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.798000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.798000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.798000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.798000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.798000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.798000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.798000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.798000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.798000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.798000 audit: BPF prog-id=183 op=LOAD Dec 13 14:34:01.798000 audit[4694]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00039b9e0 items=0 ppid=4682 pid=4694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965346630633066323432376366333430626332393965386231373236 Dec 13 14:34:01.799000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.799000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.799000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.799000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.799000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.799000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.799000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.799000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.799000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.799000 audit: BPF prog-id=184 op=LOAD Dec 13 14:34:01.799000 audit[4694]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00039ba28 items=0 ppid=4682 pid=4694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965346630633066323432376366333430626332393965386231373236 Dec 13 14:34:01.799000 audit: BPF prog-id=184 op=UNLOAD Dec 13 14:34:01.799000 audit: BPF prog-id=183 op=UNLOAD Dec 13 14:34:01.799000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.799000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.799000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.799000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.799000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.799000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.799000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.799000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.799000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.799000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:01.799000 audit: BPF prog-id=185 op=LOAD Dec 13 14:34:01.799000 audit[4694]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00039be38 items=0 ppid=4682 pid=4694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:01.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965346630633066323432376366333430626332393965386231373236 Dec 13 14:34:02.055228 systemd-networkd[1456]: cali5656c22d1d7: Gained IPv6LL Dec 13 14:34:02.571856 kubelet[2802]: I1213 14:34:02.568925 2802 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-7sbc7" podStartSLOduration=38.568899036 podStartE2EDuration="38.568899036s" podCreationTimestamp="2024-12-13 14:33:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:34:01.514101968 +0000 UTC m=+49.956478343" watchObservedRunningTime="2024-12-13 14:34:02.568899036 +0000 UTC m=+51.011275411" Dec 13 14:34:02.816680 systemd-networkd[1456]: calie0837a2e29a: Gained IPv6LL Dec 13 14:34:02.866612 env[1734]: time="2024-12-13T14:34:02.866563129Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7cb8854c79-5mr9j,Uid:9f8354fa-b7b2-49de-ab0f-223918f4108f,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d\"" Dec 13 14:34:02.922000 audit[4722]: NETFILTER_CFG table=filter:110 family=2 entries=13 op=nft_register_rule pid=4722 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:02.926623 kernel: kauditd_printk_skb: 931 callbacks suppressed Dec 13 14:34:02.926766 kernel: audit: type=1325 audit(1734100442.922:1248): table=filter:110 family=2 entries=13 op=nft_register_rule pid=4722 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:02.938297 kernel: audit: type=1300 audit(1734100442.922:1248): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffed5891290 a2=0 a3=7ffed589127c items=0 ppid=2933 pid=4722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.922000 audit[4722]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffed5891290 a2=0 a3=7ffed589127c items=0 ppid=2933 pid=4722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.948100 env[1734]: time="2024-12-13T14:34:02.948050900Z" level=info msg="StopPodSandbox for \"2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87\"" Dec 13 14:34:02.922000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:02.955524 kernel: audit: type=1327 audit(1734100442.922:1248): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:02.955000 audit[4722]: NETFILTER_CFG table=nat:111 family=2 entries=35 op=nft_register_chain pid=4722 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:02.955000 audit[4722]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffed5891290 a2=0 a3=7ffed589127c items=0 ppid=2933 pid=4722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.965669 kernel: audit: type=1325 audit(1734100442.955:1249): table=nat:111 family=2 entries=35 op=nft_register_chain pid=4722 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:02.965864 kernel: audit: type=1300 audit(1734100442.955:1249): arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffed5891290 a2=0 a3=7ffed589127c items=0 ppid=2933 pid=4722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:02.955000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:02.970375 kernel: audit: type=1327 audit(1734100442.955:1249): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:03.297665 env[1734]: 2024-12-13 14:34:03.182 [INFO][4740] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" Dec 13 14:34:03.297665 env[1734]: 2024-12-13 14:34:03.183 [INFO][4740] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" iface="eth0" netns="/var/run/netns/cni-fcbf284f-5ff0-0639-811a-2626f147bc95" Dec 13 14:34:03.297665 env[1734]: 2024-12-13 14:34:03.183 [INFO][4740] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" iface="eth0" netns="/var/run/netns/cni-fcbf284f-5ff0-0639-811a-2626f147bc95" Dec 13 14:34:03.297665 env[1734]: 2024-12-13 14:34:03.183 [INFO][4740] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" iface="eth0" netns="/var/run/netns/cni-fcbf284f-5ff0-0639-811a-2626f147bc95" Dec 13 14:34:03.297665 env[1734]: 2024-12-13 14:34:03.183 [INFO][4740] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" Dec 13 14:34:03.297665 env[1734]: 2024-12-13 14:34:03.183 [INFO][4740] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" Dec 13 14:34:03.297665 env[1734]: 2024-12-13 14:34:03.269 [INFO][4746] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" HandleID="k8s-pod-network.2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" Workload="ip--172--31--19--209-k8s-csi--node--driver--x2vwj-eth0" Dec 13 14:34:03.297665 env[1734]: 2024-12-13 14:34:03.270 [INFO][4746] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:03.297665 env[1734]: 2024-12-13 14:34:03.270 [INFO][4746] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:03.297665 env[1734]: 2024-12-13 14:34:03.284 [WARNING][4746] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" HandleID="k8s-pod-network.2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" Workload="ip--172--31--19--209-k8s-csi--node--driver--x2vwj-eth0" Dec 13 14:34:03.297665 env[1734]: 2024-12-13 14:34:03.284 [INFO][4746] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" HandleID="k8s-pod-network.2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" Workload="ip--172--31--19--209-k8s-csi--node--driver--x2vwj-eth0" Dec 13 14:34:03.297665 env[1734]: 2024-12-13 14:34:03.288 [INFO][4746] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:03.297665 env[1734]: 2024-12-13 14:34:03.291 [INFO][4740] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" Dec 13 14:34:03.304646 env[1734]: time="2024-12-13T14:34:03.304592324Z" level=info msg="TearDown network for sandbox \"2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87\" successfully" Dec 13 14:34:03.305135 env[1734]: time="2024-12-13T14:34:03.305096845Z" level=info msg="StopPodSandbox for \"2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87\" returns successfully" Dec 13 14:34:03.307347 systemd[1]: run-netns-cni\x2dfcbf284f\x2d5ff0\x2d0639\x2d811a\x2d2626f147bc95.mount: Deactivated successfully. Dec 13 14:34:03.315605 env[1734]: time="2024-12-13T14:34:03.315425504Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x2vwj,Uid:21bac09b-9db9-4cf7-814e-0d0853580069,Namespace:calico-system,Attempt:1,}" Dec 13 14:34:03.748712 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6e96ca36a43: link becomes ready Dec 13 14:34:03.748255 systemd-networkd[1456]: cali6e96ca36a43: Link UP Dec 13 14:34:03.748496 systemd-networkd[1456]: cali6e96ca36a43: Gained carrier Dec 13 14:34:03.789686 env[1734]: 2024-12-13 14:34:03.520 [INFO][4752] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--19--209-k8s-csi--node--driver--x2vwj-eth0 csi-node-driver- calico-system 21bac09b-9db9-4cf7-814e-0d0853580069 857 0 2024-12-13 14:33:32 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ip-172-31-19-209 csi-node-driver-x2vwj eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali6e96ca36a43 [] []}} ContainerID="7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715" Namespace="calico-system" Pod="csi-node-driver-x2vwj" WorkloadEndpoint="ip--172--31--19--209-k8s-csi--node--driver--x2vwj-" Dec 13 14:34:03.789686 env[1734]: 2024-12-13 14:34:03.520 [INFO][4752] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715" Namespace="calico-system" Pod="csi-node-driver-x2vwj" WorkloadEndpoint="ip--172--31--19--209-k8s-csi--node--driver--x2vwj-eth0" Dec 13 14:34:03.789686 env[1734]: 2024-12-13 14:34:03.616 [INFO][4763] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715" HandleID="k8s-pod-network.7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715" Workload="ip--172--31--19--209-k8s-csi--node--driver--x2vwj-eth0" Dec 13 14:34:03.789686 env[1734]: 2024-12-13 14:34:03.640 [INFO][4763] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715" HandleID="k8s-pod-network.7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715" Workload="ip--172--31--19--209-k8s-csi--node--driver--x2vwj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000310ab0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-19-209", "pod":"csi-node-driver-x2vwj", "timestamp":"2024-12-13 14:34:03.616731332 +0000 UTC"}, Hostname:"ip-172-31-19-209", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:34:03.789686 env[1734]: 2024-12-13 14:34:03.641 [INFO][4763] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:03.789686 env[1734]: 2024-12-13 14:34:03.641 [INFO][4763] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:03.789686 env[1734]: 2024-12-13 14:34:03.641 [INFO][4763] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-19-209' Dec 13 14:34:03.789686 env[1734]: 2024-12-13 14:34:03.648 [INFO][4763] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715" host="ip-172-31-19-209" Dec 13 14:34:03.789686 env[1734]: 2024-12-13 14:34:03.666 [INFO][4763] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-19-209" Dec 13 14:34:03.789686 env[1734]: 2024-12-13 14:34:03.684 [INFO][4763] ipam/ipam.go 489: Trying affinity for 192.168.66.64/26 host="ip-172-31-19-209" Dec 13 14:34:03.789686 env[1734]: 2024-12-13 14:34:03.693 [INFO][4763] ipam/ipam.go 155: Attempting to load block cidr=192.168.66.64/26 host="ip-172-31-19-209" Dec 13 14:34:03.789686 env[1734]: 2024-12-13 14:34:03.699 [INFO][4763] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.66.64/26 host="ip-172-31-19-209" Dec 13 14:34:03.789686 env[1734]: 2024-12-13 14:34:03.699 [INFO][4763] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.66.64/26 handle="k8s-pod-network.7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715" host="ip-172-31-19-209" Dec 13 14:34:03.789686 env[1734]: 2024-12-13 14:34:03.702 [INFO][4763] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715 Dec 13 14:34:03.789686 env[1734]: 2024-12-13 14:34:03.715 [INFO][4763] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.66.64/26 handle="k8s-pod-network.7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715" host="ip-172-31-19-209" Dec 13 14:34:03.789686 env[1734]: 2024-12-13 14:34:03.732 [INFO][4763] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.66.70/26] block=192.168.66.64/26 handle="k8s-pod-network.7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715" host="ip-172-31-19-209" Dec 13 14:34:03.789686 env[1734]: 2024-12-13 14:34:03.732 [INFO][4763] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.66.70/26] handle="k8s-pod-network.7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715" host="ip-172-31-19-209" Dec 13 14:34:03.789686 env[1734]: 2024-12-13 14:34:03.732 [INFO][4763] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:03.789686 env[1734]: 2024-12-13 14:34:03.732 [INFO][4763] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.70/26] IPv6=[] ContainerID="7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715" HandleID="k8s-pod-network.7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715" Workload="ip--172--31--19--209-k8s-csi--node--driver--x2vwj-eth0" Dec 13 14:34:03.790966 env[1734]: 2024-12-13 14:34:03.737 [INFO][4752] cni-plugin/k8s.go 386: Populated endpoint ContainerID="7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715" Namespace="calico-system" Pod="csi-node-driver-x2vwj" WorkloadEndpoint="ip--172--31--19--209-k8s-csi--node--driver--x2vwj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--209-k8s-csi--node--driver--x2vwj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"21bac09b-9db9-4cf7-814e-0d0853580069", ResourceVersion:"857", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-209", ContainerID:"", Pod:"csi-node-driver-x2vwj", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.66.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6e96ca36a43", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:03.790966 env[1734]: 2024-12-13 14:34:03.739 [INFO][4752] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.66.70/32] ContainerID="7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715" Namespace="calico-system" Pod="csi-node-driver-x2vwj" WorkloadEndpoint="ip--172--31--19--209-k8s-csi--node--driver--x2vwj-eth0" Dec 13 14:34:03.790966 env[1734]: 2024-12-13 14:34:03.739 [INFO][4752] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6e96ca36a43 ContainerID="7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715" Namespace="calico-system" Pod="csi-node-driver-x2vwj" WorkloadEndpoint="ip--172--31--19--209-k8s-csi--node--driver--x2vwj-eth0" Dec 13 14:34:03.790966 env[1734]: 2024-12-13 14:34:03.743 [INFO][4752] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715" Namespace="calico-system" Pod="csi-node-driver-x2vwj" WorkloadEndpoint="ip--172--31--19--209-k8s-csi--node--driver--x2vwj-eth0" Dec 13 14:34:03.790966 env[1734]: 2024-12-13 14:34:03.747 [INFO][4752] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715" Namespace="calico-system" Pod="csi-node-driver-x2vwj" WorkloadEndpoint="ip--172--31--19--209-k8s-csi--node--driver--x2vwj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--209-k8s-csi--node--driver--x2vwj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"21bac09b-9db9-4cf7-814e-0d0853580069", ResourceVersion:"857", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-209", ContainerID:"7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715", Pod:"csi-node-driver-x2vwj", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.66.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6e96ca36a43", MAC:"fa:07:2c:e1:e0:8d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:03.790966 env[1734]: 2024-12-13 14:34:03.774 [INFO][4752] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715" Namespace="calico-system" Pod="csi-node-driver-x2vwj" WorkloadEndpoint="ip--172--31--19--209-k8s-csi--node--driver--x2vwj-eth0" Dec 13 14:34:03.869771 env[1734]: time="2024-12-13T14:34:03.869671135Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:34:03.870232 env[1734]: time="2024-12-13T14:34:03.869787856Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:34:03.870232 env[1734]: time="2024-12-13T14:34:03.869819941Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:34:03.870232 env[1734]: time="2024-12-13T14:34:03.870019296Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715 pid=4789 runtime=io.containerd.runc.v2 Dec 13 14:34:03.957133 systemd[1]: Started cri-containerd-7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715.scope. Dec 13 14:34:04.017452 systemd[1]: Started sshd@7-172.31.19.209:22-139.178.89.65:47246.service. Dec 13 14:34:04.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.19.209:22-139.178.89.65:47246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:04.039785 kernel: audit: type=1130 audit(1734100444.033:1250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.19.209:22-139.178.89.65:47246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:04.181110 kernel: audit: type=1325 audit(1734100444.158:1251): table=filter:112 family=2 entries=10 op=nft_register_rule pid=4815 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:04.181275 kernel: audit: type=1300 audit(1734100444.158:1251): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd887bebc0 a2=0 a3=7ffd887bebac items=0 ppid=2933 pid=4815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:04.158000 audit[4815]: NETFILTER_CFG table=filter:112 family=2 entries=10 op=nft_register_rule pid=4815 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:04.158000 audit[4815]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd887bebc0 a2=0 a3=7ffd887bebac items=0 ppid=2933 pid=4815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:04.158000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:04.192382 kernel: audit: type=1327 audit(1734100444.158:1251): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:04.266000 audit[4815]: NETFILTER_CFG table=nat:113 family=2 entries=56 op=nft_register_chain pid=4815 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:04.266000 audit[4815]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffd887bebc0 a2=0 a3=7ffd887bebac items=0 ppid=2933 pid=4815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:04.266000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:04.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.277000 audit: BPF prog-id=186 op=LOAD Dec 13 14:34:04.279000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.279000 audit[4799]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=4789 pid=4799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:04.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764353863323530643634343462393262316162653035353939656166 Dec 13 14:34:04.279000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.279000 audit[4799]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=c items=0 ppid=4789 pid=4799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:04.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764353863323530643634343462393262316162653035353939656166 Dec 13 14:34:04.280000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.280000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.280000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.280000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.280000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.280000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.280000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.280000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.280000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.280000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.280000 audit: BPF prog-id=187 op=LOAD Dec 13 14:34:04.280000 audit[4799]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c00020bf40 items=0 ppid=4789 pid=4799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:04.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764353863323530643634343462393262316162653035353939656166 Dec 13 14:34:04.281000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.281000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.281000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.281000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.281000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.281000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.281000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.281000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.281000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.281000 audit: BPF prog-id=188 op=LOAD Dec 13 14:34:04.281000 audit[4799]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c00020bf88 items=0 ppid=4789 pid=4799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:04.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764353863323530643634343462393262316162653035353939656166 Dec 13 14:34:04.285000 audit: BPF prog-id=188 op=UNLOAD Dec 13 14:34:04.285000 audit: BPF prog-id=187 op=UNLOAD Dec 13 14:34:04.285000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.285000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.285000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.285000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.285000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.285000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.285000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.285000 audit[4799]: AVC avc: denied { perfmon } for pid=4799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.285000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.285000 audit[4799]: AVC avc: denied { bpf } for pid=4799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:04.285000 audit: BPF prog-id=189 op=LOAD Dec 13 14:34:04.285000 audit[4799]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c00038a398 items=0 ppid=4789 pid=4799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:04.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764353863323530643634343462393262316162653035353939656166 Dec 13 14:34:04.306653 systemd[1]: run-containerd-runc-k8s.io-7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715-runc.OZDfJw.mount: Deactivated successfully. Dec 13 14:34:04.324000 audit[4811]: USER_ACCT pid=4811 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:04.325162 sshd[4811]: Accepted publickey for core from 139.178.89.65 port 47246 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:34:04.326000 audit[4811]: CRED_ACQ pid=4811 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:04.326000 audit[4811]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9c196430 a2=3 a3=0 items=0 ppid=1 pid=4811 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:04.326000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:04.330416 sshd[4811]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:04.340984 systemd[1]: Started session-8.scope. Dec 13 14:34:04.342018 systemd-logind[1722]: New session 8 of user core. Dec 13 14:34:04.349000 audit[4811]: USER_START pid=4811 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:04.352000 audit[4827]: CRED_ACQ pid=4827 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:04.432414 env[1734]: time="2024-12-13T14:34:04.432341411Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x2vwj,Uid:21bac09b-9db9-4cf7-814e-0d0853580069,Namespace:calico-system,Attempt:1,} returns sandbox id \"7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715\"" Dec 13 14:34:04.639000 audit[4837]: NETFILTER_CFG table=filter:114 family=2 entries=50 op=nft_register_chain pid=4837 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:04.639000 audit[4837]: SYSCALL arch=c000003e syscall=46 success=yes exit=23392 a0=3 a1=7ffddd024880 a2=0 a3=7ffddd02486c items=0 ppid=3956 pid=4837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:04.639000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:05.330753 systemd-networkd[1456]: cali6e96ca36a43: Gained IPv6LL Dec 13 14:34:05.523000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:05.523000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00133d2e0 a2=fc6 a3=0 items=0 ppid=2415 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 key=(null) Dec 13 14:34:05.523000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:34:05.524000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:05.524000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0012bd620 a2=fc6 a3=0 items=0 ppid=2415 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 key=(null) Dec 13 14:34:05.524000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:34:05.526855 env[1734]: time="2024-12-13T14:34:05.526810712Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:05.532728 env[1734]: time="2024-12-13T14:34:05.532685129Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:05.536467 env[1734]: time="2024-12-13T14:34:05.536424832Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:05.540265 env[1734]: time="2024-12-13T14:34:05.540221586Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:05.542129 env[1734]: time="2024-12-13T14:34:05.541340170Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 14:34:05.565935 env[1734]: time="2024-12-13T14:34:05.565887793Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:34:05.622155 env[1734]: time="2024-12-13T14:34:05.621912711Z" level=info msg="CreateContainer within sandbox \"c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:34:05.705109 env[1734]: time="2024-12-13T14:34:05.705028093Z" level=info msg="CreateContainer within sandbox \"c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"6cca2d83872ba6d6708d498f7b766570f5e382bacd4f4c6d9b069ba54061298d\"" Dec 13 14:34:05.706031 env[1734]: time="2024-12-13T14:34:05.705992028Z" level=info msg="StartContainer for \"6cca2d83872ba6d6708d498f7b766570f5e382bacd4f4c6d9b069ba54061298d\"" Dec 13 14:34:05.768668 systemd[1]: Started cri-containerd-6cca2d83872ba6d6708d498f7b766570f5e382bacd4f4c6d9b069ba54061298d.scope. Dec 13 14:34:05.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.838000 audit: BPF prog-id=190 op=LOAD Dec 13 14:34:05.840000 audit[4857]: AVC avc: denied { bpf } for pid=4857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.840000 audit[4857]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4356 pid=4857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:05.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663636132643833383732626136643637303864343938663762373636 Dec 13 14:34:05.840000 audit[4857]: AVC avc: denied { perfmon } for pid=4857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.840000 audit[4857]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4356 pid=4857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:05.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663636132643833383732626136643637303864343938663762373636 Dec 13 14:34:05.841000 audit[4857]: AVC avc: denied { bpf } for pid=4857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.841000 audit[4857]: AVC avc: denied { bpf } for pid=4857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.841000 audit[4857]: AVC avc: denied { bpf } for pid=4857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.841000 audit[4857]: AVC avc: denied { perfmon } for pid=4857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.841000 audit[4857]: AVC avc: denied { perfmon } for pid=4857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.841000 audit[4857]: AVC avc: denied { perfmon } for pid=4857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.841000 audit[4857]: AVC avc: denied { perfmon } for pid=4857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.841000 audit[4857]: AVC avc: denied { perfmon } for pid=4857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.841000 audit[4857]: AVC avc: denied { bpf } for pid=4857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.841000 audit[4857]: AVC avc: denied { bpf } for pid=4857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.841000 audit: BPF prog-id=191 op=LOAD Dec 13 14:34:05.841000 audit[4857]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002afae0 items=0 ppid=4356 pid=4857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:05.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663636132643833383732626136643637303864343938663762373636 Dec 13 14:34:05.841000 audit[4857]: AVC avc: denied { bpf } for pid=4857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.841000 audit[4857]: AVC avc: denied { bpf } for pid=4857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.841000 audit[4857]: AVC avc: denied { perfmon } for pid=4857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.841000 audit[4857]: AVC avc: denied { perfmon } for pid=4857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.841000 audit[4857]: AVC avc: denied { perfmon } for pid=4857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.841000 audit[4857]: AVC avc: denied { perfmon } for pid=4857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.841000 audit[4857]: AVC avc: denied { perfmon } for pid=4857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.841000 audit[4857]: AVC avc: denied { bpf } for pid=4857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.841000 audit[4857]: AVC avc: denied { bpf } for pid=4857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.841000 audit: BPF prog-id=192 op=LOAD Dec 13 14:34:05.841000 audit[4857]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002afb28 items=0 ppid=4356 pid=4857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:05.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663636132643833383732626136643637303864343938663762373636 Dec 13 14:34:05.843000 audit: BPF prog-id=192 op=UNLOAD Dec 13 14:34:05.843000 audit: BPF prog-id=191 op=UNLOAD Dec 13 14:34:05.843000 audit[4857]: AVC avc: denied { bpf } for pid=4857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.843000 audit[4857]: AVC avc: denied { bpf } for pid=4857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.843000 audit[4857]: AVC avc: denied { bpf } for pid=4857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.843000 audit[4857]: AVC avc: denied { perfmon } for pid=4857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.843000 audit[4857]: AVC avc: denied { perfmon } for pid=4857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.843000 audit[4857]: AVC avc: denied { perfmon } for pid=4857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.843000 audit[4857]: AVC avc: denied { perfmon } for pid=4857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.843000 audit[4857]: AVC avc: denied { perfmon } for pid=4857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.843000 audit[4857]: AVC avc: denied { bpf } for pid=4857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.843000 audit[4857]: AVC avc: denied { bpf } for pid=4857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:05.843000 audit: BPF prog-id=193 op=LOAD Dec 13 14:34:05.843000 audit[4857]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002aff38 items=0 ppid=4356 pid=4857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:05.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663636132643833383732626136643637303864343938663762373636 Dec 13 14:34:05.879169 sshd[4811]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:05.885000 audit[4811]: USER_END pid=4811 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:05.885000 audit[4811]: CRED_DISP pid=4811 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:05.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.19.209:22-139.178.89.65:47246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:05.888119 systemd[1]: sshd@7-172.31.19.209:22-139.178.89.65:47246.service: Deactivated successfully. Dec 13 14:34:05.889267 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:34:05.892675 systemd-logind[1722]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:34:05.894299 systemd-logind[1722]: Removed session 8. Dec 13 14:34:05.922346 env[1734]: time="2024-12-13T14:34:05.922292476Z" level=info msg="StartContainer for \"6cca2d83872ba6d6708d498f7b766570f5e382bacd4f4c6d9b069ba54061298d\" returns successfully" Dec 13 14:34:06.421000 audit[2574]: AVC avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:06.421000 audit[2574]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c010e46210 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:34:06.421000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:34:06.427000 audit[2574]: AVC avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:06.429000 audit[2574]: AVC avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:06.429000 audit[2574]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c010e462a0 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:34:06.429000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:34:06.427000 audit[2574]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00a12ca20 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:34:06.427000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:34:06.432000 audit[2574]: AVC avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:06.432000 audit[2574]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00ed86fa0 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:34:06.432000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:34:06.461000 audit[2574]: AVC avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:06.461000 audit[2574]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c010e472c0 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:34:06.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:34:06.461000 audit[2574]: AVC avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:06.461000 audit[2574]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c006af6620 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:34:06.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:34:06.590728 kubelet[2802]: I1213 14:34:06.590649 2802 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-888c7f5dd-6vnlq" podStartSLOduration=29.383643149 podStartE2EDuration="34.590623009s" podCreationTimestamp="2024-12-13 14:33:32 +0000 UTC" firstStartedPulling="2024-12-13 14:34:00.358265824 +0000 UTC m=+48.800642189" lastFinishedPulling="2024-12-13 14:34:05.565245686 +0000 UTC m=+54.007622049" observedRunningTime="2024-12-13 14:34:06.441049811 +0000 UTC m=+54.883426185" watchObservedRunningTime="2024-12-13 14:34:06.590623009 +0000 UTC m=+55.032999384" Dec 13 14:34:08.660587 env[1734]: time="2024-12-13T14:34:08.660538019Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:08.663172 env[1734]: time="2024-12-13T14:34:08.663130553Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:08.665416 env[1734]: time="2024-12-13T14:34:08.665378041Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:08.667337 env[1734]: time="2024-12-13T14:34:08.667302802Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:08.667833 env[1734]: time="2024-12-13T14:34:08.667798217Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:34:08.669459 env[1734]: time="2024-12-13T14:34:08.669432938Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:34:08.674611 env[1734]: time="2024-12-13T14:34:08.673665620Z" level=info msg="CreateContainer within sandbox \"34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:34:08.725044 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3477270905.mount: Deactivated successfully. Dec 13 14:34:08.729884 env[1734]: time="2024-12-13T14:34:08.729839915Z" level=info msg="CreateContainer within sandbox \"34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"c6a80ec696fe51e41d2025fb72e12d61cb3c5ffec92ed0062c6609d6dadc7795\"" Dec 13 14:34:08.731143 env[1734]: time="2024-12-13T14:34:08.731113263Z" level=info msg="StartContainer for \"c6a80ec696fe51e41d2025fb72e12d61cb3c5ffec92ed0062c6609d6dadc7795\"" Dec 13 14:34:08.803401 systemd[1]: run-containerd-runc-k8s.io-c6a80ec696fe51e41d2025fb72e12d61cb3c5ffec92ed0062c6609d6dadc7795-runc.zCV7Zz.mount: Deactivated successfully. Dec 13 14:34:08.810726 systemd[1]: Started cri-containerd-c6a80ec696fe51e41d2025fb72e12d61cb3c5ffec92ed0062c6609d6dadc7795.scope. Dec 13 14:34:08.851405 kernel: kauditd_printk_skb: 154 callbacks suppressed Dec 13 14:34:08.851607 kernel: audit: type=1400 audit(1734100448.834:1306): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.862565 kernel: audit: type=1400 audit(1734100448.834:1307): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.862732 kernel: audit: type=1400 audit(1734100448.834:1308): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.866966 kernel: audit: type=1400 audit(1734100448.834:1309): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.870628 kernel: audit: type=1400 audit(1734100448.834:1310): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.876454 kernel: audit: type=1400 audit(1734100448.834:1311): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.881448 kernel: audit: type=1400 audit(1734100448.834:1312): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.890406 kernel: audit: type=1400 audit(1734100448.834:1313): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.890534 kernel: audit: type=1400 audit(1734100448.834:1314): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.890571 kernel: audit: type=1400 audit(1734100448.838:1315): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.838000 audit: BPF prog-id=194 op=LOAD Dec 13 14:34:08.853000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.853000 audit[4913]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4498 pid=4913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:08.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336613830656336393666653531653431643230323566623732653132 Dec 13 14:34:08.854000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.854000 audit[4913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4498 pid=4913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:08.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336613830656336393666653531653431643230323566623732653132 Dec 13 14:34:08.854000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.854000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.854000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.854000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.854000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.854000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.854000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.854000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.854000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.854000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.854000 audit: BPF prog-id=195 op=LOAD Dec 13 14:34:08.854000 audit[4913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003aa930 items=0 ppid=4498 pid=4913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:08.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336613830656336393666653531653431643230323566623732653132 Dec 13 14:34:08.857000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.857000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.857000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.857000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.857000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.857000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.857000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.857000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.857000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.857000 audit: BPF prog-id=196 op=LOAD Dec 13 14:34:08.857000 audit[4913]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003aa978 items=0 ppid=4498 pid=4913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:08.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336613830656336393666653531653431643230323566623732653132 Dec 13 14:34:08.857000 audit: BPF prog-id=196 op=UNLOAD Dec 13 14:34:08.857000 audit: BPF prog-id=195 op=UNLOAD Dec 13 14:34:08.857000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.857000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.857000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.857000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.857000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.857000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.857000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.857000 audit[4913]: AVC avc: denied { perfmon } for pid=4913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.857000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.857000 audit[4913]: AVC avc: denied { bpf } for pid=4913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:08.857000 audit: BPF prog-id=197 op=LOAD Dec 13 14:34:08.857000 audit[4913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003aad88 items=0 ppid=4498 pid=4913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:08.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336613830656336393666653531653431643230323566623732653132 Dec 13 14:34:08.916471 env[1734]: time="2024-12-13T14:34:08.916326290Z" level=info msg="StartContainer for \"c6a80ec696fe51e41d2025fb72e12d61cb3c5ffec92ed0062c6609d6dadc7795\" returns successfully" Dec 13 14:34:09.208060 env[1734]: time="2024-12-13T14:34:09.207877643Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:09.210731 env[1734]: time="2024-12-13T14:34:09.210686428Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:09.213482 env[1734]: time="2024-12-13T14:34:09.213387806Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:09.218245 env[1734]: time="2024-12-13T14:34:09.218135629Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:09.218909 env[1734]: time="2024-12-13T14:34:09.218819263Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:34:09.221204 env[1734]: time="2024-12-13T14:34:09.220995601Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:34:09.226430 env[1734]: time="2024-12-13T14:34:09.226375909Z" level=info msg="CreateContainer within sandbox \"9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:34:09.248010 env[1734]: time="2024-12-13T14:34:09.247874787Z" level=info msg="CreateContainer within sandbox \"9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"e49d95630cc9c2e853831fe99476e99f0a3f291595e2f18487963db44380ed28\"" Dec 13 14:34:09.249965 env[1734]: time="2024-12-13T14:34:09.249929266Z" level=info msg="StartContainer for \"e49d95630cc9c2e853831fe99476e99f0a3f291595e2f18487963db44380ed28\"" Dec 13 14:34:09.333500 systemd[1]: Started cri-containerd-e49d95630cc9c2e853831fe99476e99f0a3f291595e2f18487963db44380ed28.scope. Dec 13 14:34:09.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.361000 audit: BPF prog-id=198 op=LOAD Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4682 pid=4955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:09.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534396439353633306363396332653835333833316665393934373665 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4682 pid=4955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:09.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534396439353633306363396332653835333833316665393934373665 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit: BPF prog-id=199 op=LOAD Dec 13 14:34:09.362000 audit[4955]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00031bb20 items=0 ppid=4682 pid=4955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:09.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534396439353633306363396332653835333833316665393934373665 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit: BPF prog-id=200 op=LOAD Dec 13 14:34:09.362000 audit[4955]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00031bb68 items=0 ppid=4682 pid=4955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:09.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534396439353633306363396332653835333833316665393934373665 Dec 13 14:34:09.362000 audit: BPF prog-id=200 op=UNLOAD Dec 13 14:34:09.362000 audit: BPF prog-id=199 op=UNLOAD Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:09.362000 audit: BPF prog-id=201 op=LOAD Dec 13 14:34:09.362000 audit[4955]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00031bf78 items=0 ppid=4682 pid=4955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:09.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534396439353633306363396332653835333833316665393934373665 Dec 13 14:34:09.414292 env[1734]: time="2024-12-13T14:34:09.414244064Z" level=info msg="StartContainer for \"e49d95630cc9c2e853831fe99476e99f0a3f291595e2f18487963db44380ed28\" returns successfully" Dec 13 14:34:09.473696 kubelet[2802]: I1213 14:34:09.473553 2802 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7cb8854c79-5mr9j" podStartSLOduration=30.125547081 podStartE2EDuration="36.473527413s" podCreationTimestamp="2024-12-13 14:33:33 +0000 UTC" firstStartedPulling="2024-12-13 14:34:02.872770672 +0000 UTC m=+51.315147043" lastFinishedPulling="2024-12-13 14:34:09.220751003 +0000 UTC m=+57.663127375" observedRunningTime="2024-12-13 14:34:09.444113684 +0000 UTC m=+57.886490059" watchObservedRunningTime="2024-12-13 14:34:09.473527413 +0000 UTC m=+57.915903797" Dec 13 14:34:09.527000 audit[4989]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4989 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:09.527000 audit[4989]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd503e4bb0 a2=0 a3=7ffd503e4b9c items=0 ppid=2933 pid=4989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:09.527000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:09.536000 audit[4989]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4989 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:09.536000 audit[4989]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd503e4bb0 a2=0 a3=7ffd503e4b9c items=0 ppid=2933 pid=4989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:09.536000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:09.609000 audit[4992]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=4992 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:09.609000 audit[4992]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffecd3f5460 a2=0 a3=7ffecd3f544c items=0 ppid=2933 pid=4992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:09.609000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:09.615000 audit[4992]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4992 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:09.615000 audit[4992]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffecd3f5460 a2=0 a3=7ffecd3f544c items=0 ppid=2933 pid=4992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:09.615000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:10.444000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:10.444000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e15880 a2=fc6 a3=0 items=0 ppid=2415 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 key=(null) Dec 13 14:34:10.444000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:34:10.444000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:10.444000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e158c0 a2=fc6 a3=0 items=0 ppid=2415 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 key=(null) Dec 13 14:34:10.444000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:34:10.452000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:10.452000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e158e0 a2=fc6 a3=0 items=0 ppid=2415 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 key=(null) Dec 13 14:34:10.452000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:34:10.477000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:10.477000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ae4440 a2=fc6 a3=0 items=0 ppid=2415 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 key=(null) Dec 13 14:34:10.477000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:34:10.906794 systemd[1]: Started sshd@8-172.31.19.209:22-139.178.89.65:39190.service. Dec 13 14:34:10.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.19.209:22-139.178.89.65:39190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:11.046000 audit[4924]: AVC avc: denied { watch } for pid=4924 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_33_45.763121275/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c579,c662 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c579,c662 tclass=file permissive=0 Dec 13 14:34:11.046000 audit[4924]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000327f40 a2=fc6 a3=0 items=0 ppid=4498 pid=4924 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c579,c662 key=(null) Dec 13 14:34:11.046000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:34:11.123133 kubelet[2802]: I1213 14:34:11.123061 2802 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7cb8854c79-z24zd" podStartSLOduration=30.240701717 podStartE2EDuration="38.123037148s" podCreationTimestamp="2024-12-13 14:33:33 +0000 UTC" firstStartedPulling="2024-12-13 14:34:00.786746455 +0000 UTC m=+49.229122812" lastFinishedPulling="2024-12-13 14:34:08.669081876 +0000 UTC m=+57.111458243" observedRunningTime="2024-12-13 14:34:09.478055837 +0000 UTC m=+57.920432213" watchObservedRunningTime="2024-12-13 14:34:11.123037148 +0000 UTC m=+59.565413523" Dec 13 14:34:11.193000 audit[4999]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=4999 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:11.193000 audit[4999]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff5c836140 a2=0 a3=7fff5c83612c items=0 ppid=2933 pid=4999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:11.193000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:11.199000 audit[4999]: NETFILTER_CFG table=nat:120 family=2 entries=27 op=nft_register_chain pid=4999 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:11.199000 audit[4999]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff5c836140 a2=0 a3=7fff5c83612c items=0 ppid=2933 pid=4999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:11.199000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:11.209381 sshd[4996]: Accepted publickey for core from 139.178.89.65 port 39190 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:34:11.207000 audit[4996]: USER_ACCT pid=4996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:11.209000 audit[4996]: CRED_ACQ pid=4996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:11.209000 audit[4996]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff14fbdf80 a2=3 a3=0 items=0 ppid=1 pid=4996 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:11.209000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:11.222347 sshd[4996]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:11.232182 systemd-logind[1722]: New session 9 of user core. Dec 13 14:34:11.234062 systemd[1]: Started session-9.scope. Dec 13 14:34:11.244000 audit[4996]: USER_START pid=4996 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:11.246000 audit[5000]: CRED_ACQ pid=5000 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:12.450969 sshd[4996]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:12.451000 audit[4996]: USER_END pid=4996 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:12.452000 audit[4996]: CRED_DISP pid=4996 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:12.455663 systemd[1]: sshd@8-172.31.19.209:22-139.178.89.65:39190.service: Deactivated successfully. Dec 13 14:34:12.456748 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:34:12.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.19.209:22-139.178.89.65:39190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:12.459436 systemd-logind[1722]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:34:12.461704 systemd-logind[1722]: Removed session 9. Dec 13 14:34:12.463674 env[1734]: time="2024-12-13T14:34:12.463636107Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:12.469636 env[1734]: time="2024-12-13T14:34:12.469556264Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:12.475968 env[1734]: time="2024-12-13T14:34:12.475909171Z" level=info msg="StopPodSandbox for \"ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d\"" Dec 13 14:34:12.481628 env[1734]: time="2024-12-13T14:34:12.481593654Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:12.493906 env[1734]: time="2024-12-13T14:34:12.486746421Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:12.493906 env[1734]: time="2024-12-13T14:34:12.487283508Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:34:12.524516 env[1734]: time="2024-12-13T14:34:12.524475278Z" level=info msg="CreateContainer within sandbox \"7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:34:12.534487 systemd[1]: run-containerd-runc-k8s.io-d9690d5a0b6973eaa29d42a4592cdb85f7c694dd7cdbf83a1414e1abeea6b144-runc.9L4Q5d.mount: Deactivated successfully. Dec 13 14:34:12.564522 env[1734]: time="2024-12-13T14:34:12.564452433Z" level=info msg="CreateContainer within sandbox \"7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"91dea595a8fb6f710f5dbdf6a331da1799135842a32160f627fb557d8cc88081\"" Dec 13 14:34:12.565807 env[1734]: time="2024-12-13T14:34:12.565768637Z" level=info msg="StartContainer for \"91dea595a8fb6f710f5dbdf6a331da1799135842a32160f627fb557d8cc88081\"" Dec 13 14:34:12.621254 systemd[1]: Started cri-containerd-91dea595a8fb6f710f5dbdf6a331da1799135842a32160f627fb557d8cc88081.scope. Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit[5041]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f8f60c86618 items=0 ppid=4789 pid=5041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:12.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931646561353935613866623666373130663564626466366133333164 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit: BPF prog-id=202 op=LOAD Dec 13 14:34:12.679000 audit[5041]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00033bd28 items=0 ppid=4789 pid=5041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:12.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931646561353935613866623666373130663564626466366133333164 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit: BPF prog-id=203 op=LOAD Dec 13 14:34:12.679000 audit[5041]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00033bd78 items=0 ppid=4789 pid=5041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:12.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931646561353935613866623666373130663564626466366133333164 Dec 13 14:34:12.679000 audit: BPF prog-id=203 op=UNLOAD Dec 13 14:34:12.679000 audit: BPF prog-id=202 op=UNLOAD Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { perfmon } for pid=5041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit[5041]: AVC avc: denied { bpf } for pid=5041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:12.679000 audit: BPF prog-id=204 op=LOAD Dec 13 14:34:12.679000 audit[5041]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00033be08 items=0 ppid=4789 pid=5041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:12.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931646561353935613866623666373130663564626466366133333164 Dec 13 14:34:12.705317 env[1734]: time="2024-12-13T14:34:12.705208522Z" level=info msg="StartContainer for \"91dea595a8fb6f710f5dbdf6a331da1799135842a32160f627fb557d8cc88081\" returns successfully" Dec 13 14:34:12.710004 env[1734]: time="2024-12-13T14:34:12.709957690Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:34:12.754000 audit[4969]: AVC avc: denied { watch } for pid=4969 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_33_45.2624344173/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c834 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c834 tclass=file permissive=0 Dec 13 14:34:12.754000 audit[4969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00034b6c0 a2=fc6 a3=0 items=0 ppid=4682 pid=4969 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c834 key=(null) Dec 13 14:34:12.754000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:34:12.961000 audit[5087]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=5087 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:12.961000 audit[5087]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc1059c2f0 a2=0 a3=7ffc1059c2dc items=0 ppid=2933 pid=5087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:12.961000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:12.967000 audit[5087]: NETFILTER_CFG table=nat:122 family=2 entries=34 op=nft_register_chain pid=5087 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:12.967000 audit[5087]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffc1059c2f0 a2=0 a3=7ffc1059c2dc items=0 ppid=2933 pid=5087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:12.967000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:13.073794 env[1734]: 2024-12-13 14:34:12.950 [WARNING][5061] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0", GenerateName:"calico-kube-controllers-888c7f5dd-", Namespace:"calico-system", SelfLink:"", UID:"dca070a3-4cd0-4f67-ba56-957513d4401c", ResourceVersion:"911", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"888c7f5dd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-209", ContainerID:"c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50", Pod:"calico-kube-controllers-888c7f5dd-6vnlq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.66.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif77ca70f44f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:13.073794 env[1734]: 2024-12-13 14:34:12.954 [INFO][5061] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" Dec 13 14:34:13.073794 env[1734]: 2024-12-13 14:34:12.954 [INFO][5061] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" iface="eth0" netns="" Dec 13 14:34:13.073794 env[1734]: 2024-12-13 14:34:12.955 [INFO][5061] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" Dec 13 14:34:13.073794 env[1734]: 2024-12-13 14:34:12.955 [INFO][5061] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" Dec 13 14:34:13.073794 env[1734]: 2024-12-13 14:34:13.005 [INFO][5086] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" HandleID="k8s-pod-network.ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" Workload="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" Dec 13 14:34:13.073794 env[1734]: 2024-12-13 14:34:13.005 [INFO][5086] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:13.073794 env[1734]: 2024-12-13 14:34:13.005 [INFO][5086] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:13.073794 env[1734]: 2024-12-13 14:34:13.034 [WARNING][5086] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" HandleID="k8s-pod-network.ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" Workload="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" Dec 13 14:34:13.073794 env[1734]: 2024-12-13 14:34:13.034 [INFO][5086] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" HandleID="k8s-pod-network.ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" Workload="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" Dec 13 14:34:13.073794 env[1734]: 2024-12-13 14:34:13.048 [INFO][5086] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:13.073794 env[1734]: 2024-12-13 14:34:13.058 [INFO][5061] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" Dec 13 14:34:13.075055 env[1734]: time="2024-12-13T14:34:13.073832401Z" level=info msg="TearDown network for sandbox \"ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d\" successfully" Dec 13 14:34:13.075055 env[1734]: time="2024-12-13T14:34:13.073870051Z" level=info msg="StopPodSandbox for \"ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d\" returns successfully" Dec 13 14:34:13.078694 env[1734]: time="2024-12-13T14:34:13.078655854Z" level=info msg="RemovePodSandbox for \"ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d\"" Dec 13 14:34:13.078962 env[1734]: time="2024-12-13T14:34:13.078890460Z" level=info msg="Forcibly stopping sandbox \"ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d\"" Dec 13 14:34:13.247698 env[1734]: 2024-12-13 14:34:13.172 [WARNING][5123] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0", GenerateName:"calico-kube-controllers-888c7f5dd-", Namespace:"calico-system", SelfLink:"", UID:"dca070a3-4cd0-4f67-ba56-957513d4401c", ResourceVersion:"911", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"888c7f5dd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-209", ContainerID:"c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50", Pod:"calico-kube-controllers-888c7f5dd-6vnlq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.66.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif77ca70f44f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:13.247698 env[1734]: 2024-12-13 14:34:13.173 [INFO][5123] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" Dec 13 14:34:13.247698 env[1734]: 2024-12-13 14:34:13.173 [INFO][5123] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" iface="eth0" netns="" Dec 13 14:34:13.247698 env[1734]: 2024-12-13 14:34:13.173 [INFO][5123] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" Dec 13 14:34:13.247698 env[1734]: 2024-12-13 14:34:13.173 [INFO][5123] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" Dec 13 14:34:13.247698 env[1734]: 2024-12-13 14:34:13.223 [INFO][5133] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" HandleID="k8s-pod-network.ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" Workload="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" Dec 13 14:34:13.247698 env[1734]: 2024-12-13 14:34:13.224 [INFO][5133] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:13.247698 env[1734]: 2024-12-13 14:34:13.224 [INFO][5133] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:13.247698 env[1734]: 2024-12-13 14:34:13.238 [WARNING][5133] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" HandleID="k8s-pod-network.ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" Workload="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" Dec 13 14:34:13.247698 env[1734]: 2024-12-13 14:34:13.238 [INFO][5133] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" HandleID="k8s-pod-network.ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" Workload="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" Dec 13 14:34:13.247698 env[1734]: 2024-12-13 14:34:13.241 [INFO][5133] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:13.247698 env[1734]: 2024-12-13 14:34:13.244 [INFO][5123] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d" Dec 13 14:34:13.249137 env[1734]: time="2024-12-13T14:34:13.249086455Z" level=info msg="TearDown network for sandbox \"ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d\" successfully" Dec 13 14:34:13.257369 env[1734]: time="2024-12-13T14:34:13.257298920Z" level=info msg="RemovePodSandbox \"ed04dfa4295cd723c72165a450615252453e6caddcff8cfc2f879a2cb488d61d\" returns successfully" Dec 13 14:34:13.258390 env[1734]: time="2024-12-13T14:34:13.258328849Z" level=info msg="StopPodSandbox for \"b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c\"" Dec 13 14:34:13.408670 env[1734]: 2024-12-13 14:34:13.333 [WARNING][5152] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--z24zd-eth0", GenerateName:"calico-apiserver-7cb8854c79-", Namespace:"calico-apiserver", SelfLink:"", UID:"ee4d2866-d469-4d0b-9e9f-6b3aa8e11102", ResourceVersion:"948", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7cb8854c79", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-209", ContainerID:"34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587", Pod:"calico-apiserver-7cb8854c79-z24zd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.66.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2dacf473a0a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:13.408670 env[1734]: 2024-12-13 14:34:13.335 [INFO][5152] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" Dec 13 14:34:13.408670 env[1734]: 2024-12-13 14:34:13.335 [INFO][5152] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" iface="eth0" netns="" Dec 13 14:34:13.408670 env[1734]: 2024-12-13 14:34:13.335 [INFO][5152] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" Dec 13 14:34:13.408670 env[1734]: 2024-12-13 14:34:13.335 [INFO][5152] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" Dec 13 14:34:13.408670 env[1734]: 2024-12-13 14:34:13.376 [INFO][5158] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" HandleID="k8s-pod-network.b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" Workload="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--z24zd-eth0" Dec 13 14:34:13.408670 env[1734]: 2024-12-13 14:34:13.377 [INFO][5158] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:13.408670 env[1734]: 2024-12-13 14:34:13.377 [INFO][5158] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:13.408670 env[1734]: 2024-12-13 14:34:13.390 [WARNING][5158] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" HandleID="k8s-pod-network.b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" Workload="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--z24zd-eth0" Dec 13 14:34:13.408670 env[1734]: 2024-12-13 14:34:13.390 [INFO][5158] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" HandleID="k8s-pod-network.b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" Workload="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--z24zd-eth0" Dec 13 14:34:13.408670 env[1734]: 2024-12-13 14:34:13.400 [INFO][5158] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:13.408670 env[1734]: 2024-12-13 14:34:13.404 [INFO][5152] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" Dec 13 14:34:13.411252 env[1734]: time="2024-12-13T14:34:13.408698971Z" level=info msg="TearDown network for sandbox \"b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c\" successfully" Dec 13 14:34:13.411252 env[1734]: time="2024-12-13T14:34:13.408733408Z" level=info msg="StopPodSandbox for \"b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c\" returns successfully" Dec 13 14:34:13.411252 env[1734]: time="2024-12-13T14:34:13.409235259Z" level=info msg="RemovePodSandbox for \"b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c\"" Dec 13 14:34:13.411252 env[1734]: time="2024-12-13T14:34:13.409269481Z" level=info msg="Forcibly stopping sandbox \"b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c\"" Dec 13 14:34:13.537636 env[1734]: 2024-12-13 14:34:13.467 [WARNING][5176] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--z24zd-eth0", GenerateName:"calico-apiserver-7cb8854c79-", Namespace:"calico-apiserver", SelfLink:"", UID:"ee4d2866-d469-4d0b-9e9f-6b3aa8e11102", ResourceVersion:"948", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7cb8854c79", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-209", ContainerID:"34362b252b2fd846a7507c324bce72dc4abf2751882aabdd03d7de82ecb59587", Pod:"calico-apiserver-7cb8854c79-z24zd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.66.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2dacf473a0a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:13.537636 env[1734]: 2024-12-13 14:34:13.468 [INFO][5176] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" Dec 13 14:34:13.537636 env[1734]: 2024-12-13 14:34:13.468 [INFO][5176] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" iface="eth0" netns="" Dec 13 14:34:13.537636 env[1734]: 2024-12-13 14:34:13.468 [INFO][5176] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" Dec 13 14:34:13.537636 env[1734]: 2024-12-13 14:34:13.468 [INFO][5176] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" Dec 13 14:34:13.537636 env[1734]: 2024-12-13 14:34:13.517 [INFO][5182] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" HandleID="k8s-pod-network.b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" Workload="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--z24zd-eth0" Dec 13 14:34:13.537636 env[1734]: 2024-12-13 14:34:13.517 [INFO][5182] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:13.537636 env[1734]: 2024-12-13 14:34:13.517 [INFO][5182] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:13.537636 env[1734]: 2024-12-13 14:34:13.526 [WARNING][5182] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" HandleID="k8s-pod-network.b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" Workload="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--z24zd-eth0" Dec 13 14:34:13.537636 env[1734]: 2024-12-13 14:34:13.526 [INFO][5182] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" HandleID="k8s-pod-network.b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" Workload="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--z24zd-eth0" Dec 13 14:34:13.537636 env[1734]: 2024-12-13 14:34:13.532 [INFO][5182] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:13.537636 env[1734]: 2024-12-13 14:34:13.534 [INFO][5176] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c" Dec 13 14:34:13.537636 env[1734]: time="2024-12-13T14:34:13.536344347Z" level=info msg="TearDown network for sandbox \"b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c\" successfully" Dec 13 14:34:13.541447 env[1734]: time="2024-12-13T14:34:13.541404089Z" level=info msg="RemovePodSandbox \"b7503235f5f7b78d117f5445cb7e22b0e2da23aef03a1b42fd4cb1370517c06c\" returns successfully" Dec 13 14:34:13.542022 env[1734]: time="2024-12-13T14:34:13.541987538Z" level=info msg="StopPodSandbox for \"518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f\"" Dec 13 14:34:13.631127 env[1734]: 2024-12-13 14:34:13.588 [WARNING][5202] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--209-k8s-coredns--7db6d8ff4d--7sbc7-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"74fcd6f9-93f1-4dfe-99ac-a1543b30279a", ResourceVersion:"843", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-209", ContainerID:"3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1", Pod:"coredns-7db6d8ff4d-7sbc7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.66.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calidf721ab8188", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:13.631127 env[1734]: 2024-12-13 14:34:13.589 [INFO][5202] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" Dec 13 14:34:13.631127 env[1734]: 2024-12-13 14:34:13.589 [INFO][5202] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" iface="eth0" netns="" Dec 13 14:34:13.631127 env[1734]: 2024-12-13 14:34:13.589 [INFO][5202] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" Dec 13 14:34:13.631127 env[1734]: 2024-12-13 14:34:13.589 [INFO][5202] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" Dec 13 14:34:13.631127 env[1734]: 2024-12-13 14:34:13.618 [INFO][5209] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" HandleID="k8s-pod-network.518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" Workload="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--7sbc7-eth0" Dec 13 14:34:13.631127 env[1734]: 2024-12-13 14:34:13.619 [INFO][5209] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:13.631127 env[1734]: 2024-12-13 14:34:13.619 [INFO][5209] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:13.631127 env[1734]: 2024-12-13 14:34:13.625 [WARNING][5209] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" HandleID="k8s-pod-network.518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" Workload="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--7sbc7-eth0" Dec 13 14:34:13.631127 env[1734]: 2024-12-13 14:34:13.625 [INFO][5209] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" HandleID="k8s-pod-network.518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" Workload="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--7sbc7-eth0" Dec 13 14:34:13.631127 env[1734]: 2024-12-13 14:34:13.627 [INFO][5209] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:13.631127 env[1734]: 2024-12-13 14:34:13.629 [INFO][5202] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" Dec 13 14:34:13.632797 env[1734]: time="2024-12-13T14:34:13.631163846Z" level=info msg="TearDown network for sandbox \"518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f\" successfully" Dec 13 14:34:13.632797 env[1734]: time="2024-12-13T14:34:13.631202235Z" level=info msg="StopPodSandbox for \"518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f\" returns successfully" Dec 13 14:34:13.632797 env[1734]: time="2024-12-13T14:34:13.632430995Z" level=info msg="RemovePodSandbox for \"518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f\"" Dec 13 14:34:13.632797 env[1734]: time="2024-12-13T14:34:13.632480341Z" level=info msg="Forcibly stopping sandbox \"518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f\"" Dec 13 14:34:13.745936 env[1734]: 2024-12-13 14:34:13.702 [WARNING][5227] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--209-k8s-coredns--7db6d8ff4d--7sbc7-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"74fcd6f9-93f1-4dfe-99ac-a1543b30279a", ResourceVersion:"843", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-209", ContainerID:"3fcfab3e39dea344477e41d15092729be8d0541e3bc7816c24babab292bcbdc1", Pod:"coredns-7db6d8ff4d-7sbc7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.66.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calidf721ab8188", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:13.745936 env[1734]: 2024-12-13 14:34:13.703 [INFO][5227] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" Dec 13 14:34:13.745936 env[1734]: 2024-12-13 14:34:13.703 [INFO][5227] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" iface="eth0" netns="" Dec 13 14:34:13.745936 env[1734]: 2024-12-13 14:34:13.703 [INFO][5227] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" Dec 13 14:34:13.745936 env[1734]: 2024-12-13 14:34:13.703 [INFO][5227] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" Dec 13 14:34:13.745936 env[1734]: 2024-12-13 14:34:13.732 [INFO][5233] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" HandleID="k8s-pod-network.518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" Workload="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--7sbc7-eth0" Dec 13 14:34:13.745936 env[1734]: 2024-12-13 14:34:13.732 [INFO][5233] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:13.745936 env[1734]: 2024-12-13 14:34:13.732 [INFO][5233] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:13.745936 env[1734]: 2024-12-13 14:34:13.739 [WARNING][5233] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" HandleID="k8s-pod-network.518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" Workload="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--7sbc7-eth0" Dec 13 14:34:13.745936 env[1734]: 2024-12-13 14:34:13.739 [INFO][5233] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" HandleID="k8s-pod-network.518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" Workload="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--7sbc7-eth0" Dec 13 14:34:13.745936 env[1734]: 2024-12-13 14:34:13.742 [INFO][5233] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:13.745936 env[1734]: 2024-12-13 14:34:13.744 [INFO][5227] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f" Dec 13 14:34:13.746758 env[1734]: time="2024-12-13T14:34:13.745963645Z" level=info msg="TearDown network for sandbox \"518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f\" successfully" Dec 13 14:34:13.750723 env[1734]: time="2024-12-13T14:34:13.750673147Z" level=info msg="RemovePodSandbox \"518c399cdeb6bd5741d5d2bb0f36c249095f5444bc88da8ea1d71cb3402ecf8f\" returns successfully" Dec 13 14:34:13.751223 env[1734]: time="2024-12-13T14:34:13.751188590Z" level=info msg="StopPodSandbox for \"2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87\"" Dec 13 14:34:13.844949 env[1734]: 2024-12-13 14:34:13.799 [WARNING][5253] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--209-k8s-csi--node--driver--x2vwj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"21bac09b-9db9-4cf7-814e-0d0853580069", ResourceVersion:"870", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-209", ContainerID:"7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715", Pod:"csi-node-driver-x2vwj", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.66.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6e96ca36a43", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:13.844949 env[1734]: 2024-12-13 14:34:13.799 [INFO][5253] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" Dec 13 14:34:13.844949 env[1734]: 2024-12-13 14:34:13.799 [INFO][5253] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" iface="eth0" netns="" Dec 13 14:34:13.844949 env[1734]: 2024-12-13 14:34:13.799 [INFO][5253] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" Dec 13 14:34:13.844949 env[1734]: 2024-12-13 14:34:13.799 [INFO][5253] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" Dec 13 14:34:13.844949 env[1734]: 2024-12-13 14:34:13.827 [INFO][5260] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" HandleID="k8s-pod-network.2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" Workload="ip--172--31--19--209-k8s-csi--node--driver--x2vwj-eth0" Dec 13 14:34:13.844949 env[1734]: 2024-12-13 14:34:13.828 [INFO][5260] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:13.844949 env[1734]: 2024-12-13 14:34:13.828 [INFO][5260] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:13.844949 env[1734]: 2024-12-13 14:34:13.837 [WARNING][5260] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" HandleID="k8s-pod-network.2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" Workload="ip--172--31--19--209-k8s-csi--node--driver--x2vwj-eth0" Dec 13 14:34:13.844949 env[1734]: 2024-12-13 14:34:13.837 [INFO][5260] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" HandleID="k8s-pod-network.2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" Workload="ip--172--31--19--209-k8s-csi--node--driver--x2vwj-eth0" Dec 13 14:34:13.844949 env[1734]: 2024-12-13 14:34:13.839 [INFO][5260] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:13.844949 env[1734]: 2024-12-13 14:34:13.841 [INFO][5253] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" Dec 13 14:34:13.844949 env[1734]: time="2024-12-13T14:34:13.843347375Z" level=info msg="TearDown network for sandbox \"2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87\" successfully" Dec 13 14:34:13.844949 env[1734]: time="2024-12-13T14:34:13.843404539Z" level=info msg="StopPodSandbox for \"2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87\" returns successfully" Dec 13 14:34:13.846266 env[1734]: time="2024-12-13T14:34:13.846233623Z" level=info msg="RemovePodSandbox for \"2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87\"" Dec 13 14:34:13.846652 env[1734]: time="2024-12-13T14:34:13.846594492Z" level=info msg="Forcibly stopping sandbox \"2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87\"" Dec 13 14:34:13.948850 env[1734]: 2024-12-13 14:34:13.894 [WARNING][5279] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--209-k8s-csi--node--driver--x2vwj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"21bac09b-9db9-4cf7-814e-0d0853580069", ResourceVersion:"870", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-209", ContainerID:"7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715", Pod:"csi-node-driver-x2vwj", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.66.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6e96ca36a43", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:13.948850 env[1734]: 2024-12-13 14:34:13.894 [INFO][5279] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" Dec 13 14:34:13.948850 env[1734]: 2024-12-13 14:34:13.894 [INFO][5279] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" iface="eth0" netns="" Dec 13 14:34:13.948850 env[1734]: 2024-12-13 14:34:13.894 [INFO][5279] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" Dec 13 14:34:13.948850 env[1734]: 2024-12-13 14:34:13.894 [INFO][5279] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" Dec 13 14:34:13.948850 env[1734]: 2024-12-13 14:34:13.935 [INFO][5285] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" HandleID="k8s-pod-network.2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" Workload="ip--172--31--19--209-k8s-csi--node--driver--x2vwj-eth0" Dec 13 14:34:13.948850 env[1734]: 2024-12-13 14:34:13.935 [INFO][5285] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:13.948850 env[1734]: 2024-12-13 14:34:13.935 [INFO][5285] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:13.948850 env[1734]: 2024-12-13 14:34:13.943 [WARNING][5285] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" HandleID="k8s-pod-network.2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" Workload="ip--172--31--19--209-k8s-csi--node--driver--x2vwj-eth0" Dec 13 14:34:13.948850 env[1734]: 2024-12-13 14:34:13.943 [INFO][5285] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" HandleID="k8s-pod-network.2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" Workload="ip--172--31--19--209-k8s-csi--node--driver--x2vwj-eth0" Dec 13 14:34:13.948850 env[1734]: 2024-12-13 14:34:13.944 [INFO][5285] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:13.948850 env[1734]: 2024-12-13 14:34:13.946 [INFO][5279] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87" Dec 13 14:34:13.949640 env[1734]: time="2024-12-13T14:34:13.948879820Z" level=info msg="TearDown network for sandbox \"2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87\" successfully" Dec 13 14:34:13.964669 env[1734]: time="2024-12-13T14:34:13.964585352Z" level=info msg="RemovePodSandbox \"2e82190ddfc7074fb918a24e5a10d6a43ea5397a334d1fa298e6edc46c1c0a87\" returns successfully" Dec 13 14:34:13.965298 env[1734]: time="2024-12-13T14:34:13.965262986Z" level=info msg="StopPodSandbox for \"7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e\"" Dec 13 14:34:14.096649 env[1734]: 2024-12-13 14:34:14.027 [WARNING][5304] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--5mr9j-eth0", GenerateName:"calico-apiserver-7cb8854c79-", Namespace:"calico-apiserver", SelfLink:"", UID:"9f8354fa-b7b2-49de-ab0f-223918f4108f", ResourceVersion:"966", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7cb8854c79", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-209", ContainerID:"9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d", Pod:"calico-apiserver-7cb8854c79-5mr9j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.66.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie0837a2e29a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:14.096649 env[1734]: 2024-12-13 14:34:14.027 [INFO][5304] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" Dec 13 14:34:14.096649 env[1734]: 2024-12-13 14:34:14.027 [INFO][5304] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" iface="eth0" netns="" Dec 13 14:34:14.096649 env[1734]: 2024-12-13 14:34:14.027 [INFO][5304] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" Dec 13 14:34:14.096649 env[1734]: 2024-12-13 14:34:14.027 [INFO][5304] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" Dec 13 14:34:14.096649 env[1734]: 2024-12-13 14:34:14.081 [INFO][5310] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" HandleID="k8s-pod-network.7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" Workload="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--5mr9j-eth0" Dec 13 14:34:14.096649 env[1734]: 2024-12-13 14:34:14.082 [INFO][5310] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:14.096649 env[1734]: 2024-12-13 14:34:14.082 [INFO][5310] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:14.096649 env[1734]: 2024-12-13 14:34:14.090 [WARNING][5310] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" HandleID="k8s-pod-network.7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" Workload="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--5mr9j-eth0" Dec 13 14:34:14.096649 env[1734]: 2024-12-13 14:34:14.090 [INFO][5310] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" HandleID="k8s-pod-network.7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" Workload="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--5mr9j-eth0" Dec 13 14:34:14.096649 env[1734]: 2024-12-13 14:34:14.092 [INFO][5310] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:14.096649 env[1734]: 2024-12-13 14:34:14.094 [INFO][5304] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" Dec 13 14:34:14.098340 env[1734]: time="2024-12-13T14:34:14.096611047Z" level=info msg="TearDown network for sandbox \"7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e\" successfully" Dec 13 14:34:14.099230 env[1734]: time="2024-12-13T14:34:14.098392108Z" level=info msg="StopPodSandbox for \"7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e\" returns successfully" Dec 13 14:34:14.099380 env[1734]: time="2024-12-13T14:34:14.099337716Z" level=info msg="RemovePodSandbox for \"7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e\"" Dec 13 14:34:14.099516 env[1734]: time="2024-12-13T14:34:14.099464450Z" level=info msg="Forcibly stopping sandbox \"7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e\"" Dec 13 14:34:14.212348 env[1734]: 2024-12-13 14:34:14.153 [WARNING][5328] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--5mr9j-eth0", GenerateName:"calico-apiserver-7cb8854c79-", Namespace:"calico-apiserver", SelfLink:"", UID:"9f8354fa-b7b2-49de-ab0f-223918f4108f", ResourceVersion:"966", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7cb8854c79", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-209", ContainerID:"9e4f0c0f2427cf340bc299e8b17266755cd6159564bceba4b59c7a16bd85008d", Pod:"calico-apiserver-7cb8854c79-5mr9j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.66.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie0837a2e29a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:14.212348 env[1734]: 2024-12-13 14:34:14.153 [INFO][5328] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" Dec 13 14:34:14.212348 env[1734]: 2024-12-13 14:34:14.153 [INFO][5328] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" iface="eth0" netns="" Dec 13 14:34:14.212348 env[1734]: 2024-12-13 14:34:14.153 [INFO][5328] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" Dec 13 14:34:14.212348 env[1734]: 2024-12-13 14:34:14.153 [INFO][5328] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" Dec 13 14:34:14.212348 env[1734]: 2024-12-13 14:34:14.191 [INFO][5335] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" HandleID="k8s-pod-network.7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" Workload="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--5mr9j-eth0" Dec 13 14:34:14.212348 env[1734]: 2024-12-13 14:34:14.191 [INFO][5335] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:14.212348 env[1734]: 2024-12-13 14:34:14.191 [INFO][5335] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:14.212348 env[1734]: 2024-12-13 14:34:14.206 [WARNING][5335] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" HandleID="k8s-pod-network.7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" Workload="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--5mr9j-eth0" Dec 13 14:34:14.212348 env[1734]: 2024-12-13 14:34:14.206 [INFO][5335] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" HandleID="k8s-pod-network.7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" Workload="ip--172--31--19--209-k8s-calico--apiserver--7cb8854c79--5mr9j-eth0" Dec 13 14:34:14.212348 env[1734]: 2024-12-13 14:34:14.207 [INFO][5335] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:14.212348 env[1734]: 2024-12-13 14:34:14.210 [INFO][5328] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e" Dec 13 14:34:14.213889 env[1734]: time="2024-12-13T14:34:14.212432252Z" level=info msg="TearDown network for sandbox \"7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e\" successfully" Dec 13 14:34:14.217709 env[1734]: time="2024-12-13T14:34:14.217644894Z" level=info msg="RemovePodSandbox \"7c10ff5c20962e9bd2c6d86d331b71ffa51cc3d50423b8094b8fe0b22df4194e\" returns successfully" Dec 13 14:34:14.218409 env[1734]: time="2024-12-13T14:34:14.218346317Z" level=info msg="StopPodSandbox for \"d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4\"" Dec 13 14:34:14.303395 env[1734]: 2024-12-13 14:34:14.262 [WARNING][5353] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--209-k8s-coredns--7db6d8ff4d--2hzrj-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"7abbd636-a28b-4594-90af-7cf85567b8ac", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-209", ContainerID:"3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b", Pod:"coredns-7db6d8ff4d-2hzrj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.66.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5656c22d1d7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:14.303395 env[1734]: 2024-12-13 14:34:14.262 [INFO][5353] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" Dec 13 14:34:14.303395 env[1734]: 2024-12-13 14:34:14.262 [INFO][5353] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" iface="eth0" netns="" Dec 13 14:34:14.303395 env[1734]: 2024-12-13 14:34:14.262 [INFO][5353] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" Dec 13 14:34:14.303395 env[1734]: 2024-12-13 14:34:14.262 [INFO][5353] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" Dec 13 14:34:14.303395 env[1734]: 2024-12-13 14:34:14.287 [INFO][5359] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" HandleID="k8s-pod-network.d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" Workload="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--2hzrj-eth0" Dec 13 14:34:14.303395 env[1734]: 2024-12-13 14:34:14.287 [INFO][5359] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:14.303395 env[1734]: 2024-12-13 14:34:14.287 [INFO][5359] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:14.303395 env[1734]: 2024-12-13 14:34:14.297 [WARNING][5359] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" HandleID="k8s-pod-network.d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" Workload="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--2hzrj-eth0" Dec 13 14:34:14.303395 env[1734]: 2024-12-13 14:34:14.297 [INFO][5359] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" HandleID="k8s-pod-network.d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" Workload="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--2hzrj-eth0" Dec 13 14:34:14.303395 env[1734]: 2024-12-13 14:34:14.299 [INFO][5359] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:14.303395 env[1734]: 2024-12-13 14:34:14.301 [INFO][5353] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" Dec 13 14:34:14.304073 env[1734]: time="2024-12-13T14:34:14.304028427Z" level=info msg="TearDown network for sandbox \"d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4\" successfully" Dec 13 14:34:14.304211 env[1734]: time="2024-12-13T14:34:14.304070692Z" level=info msg="StopPodSandbox for \"d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4\" returns successfully" Dec 13 14:34:14.304826 env[1734]: time="2024-12-13T14:34:14.304787452Z" level=info msg="RemovePodSandbox for \"d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4\"" Dec 13 14:34:14.305668 env[1734]: time="2024-12-13T14:34:14.304822180Z" level=info msg="Forcibly stopping sandbox \"d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4\"" Dec 13 14:34:14.471456 env[1734]: 2024-12-13 14:34:14.348 [WARNING][5377] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--209-k8s-coredns--7db6d8ff4d--2hzrj-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"7abbd636-a28b-4594-90af-7cf85567b8ac", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 33, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-209", ContainerID:"3278aaa29bd216c1e574b0f6ea52bcc298cca330bfacbba0818b89cc49e7928b", Pod:"coredns-7db6d8ff4d-2hzrj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.66.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5656c22d1d7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:14.471456 env[1734]: 2024-12-13 14:34:14.349 [INFO][5377] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" Dec 13 14:34:14.471456 env[1734]: 2024-12-13 14:34:14.349 [INFO][5377] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" iface="eth0" netns="" Dec 13 14:34:14.471456 env[1734]: 2024-12-13 14:34:14.349 [INFO][5377] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" Dec 13 14:34:14.471456 env[1734]: 2024-12-13 14:34:14.349 [INFO][5377] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" Dec 13 14:34:14.471456 env[1734]: 2024-12-13 14:34:14.447 [INFO][5383] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" HandleID="k8s-pod-network.d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" Workload="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--2hzrj-eth0" Dec 13 14:34:14.471456 env[1734]: 2024-12-13 14:34:14.447 [INFO][5383] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:14.471456 env[1734]: 2024-12-13 14:34:14.447 [INFO][5383] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:14.471456 env[1734]: 2024-12-13 14:34:14.464 [WARNING][5383] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" HandleID="k8s-pod-network.d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" Workload="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--2hzrj-eth0" Dec 13 14:34:14.471456 env[1734]: 2024-12-13 14:34:14.464 [INFO][5383] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" HandleID="k8s-pod-network.d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" Workload="ip--172--31--19--209-k8s-coredns--7db6d8ff4d--2hzrj-eth0" Dec 13 14:34:14.471456 env[1734]: 2024-12-13 14:34:14.465 [INFO][5383] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:14.471456 env[1734]: 2024-12-13 14:34:14.468 [INFO][5377] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4" Dec 13 14:34:14.473698 env[1734]: time="2024-12-13T14:34:14.471509945Z" level=info msg="TearDown network for sandbox \"d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4\" successfully" Dec 13 14:34:14.476899 env[1734]: time="2024-12-13T14:34:14.476778973Z" level=info msg="RemovePodSandbox \"d7cb06c986089c70e4cb50945922a41c3c657ccfd8de6c2c395670ac863847f4\" returns successfully" Dec 13 14:34:15.108156 env[1734]: time="2024-12-13T14:34:15.108096475Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:15.110761 env[1734]: time="2024-12-13T14:34:15.110714755Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:15.113894 env[1734]: time="2024-12-13T14:34:15.113848355Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:15.116797 env[1734]: time="2024-12-13T14:34:15.116750972Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:34:15.117481 env[1734]: time="2024-12-13T14:34:15.117442067Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:34:15.123608 env[1734]: time="2024-12-13T14:34:15.123563316Z" level=info msg="CreateContainer within sandbox \"7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:34:15.146285 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2035137244.mount: Deactivated successfully. Dec 13 14:34:15.152930 env[1734]: time="2024-12-13T14:34:15.152874940Z" level=info msg="CreateContainer within sandbox \"7d58c250d6444b92b1abe05599eaf3eeffc4184c16b081329c54a27b0b165715\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"d126b8e941633b05f0c4ea58922060a875d4bb311ac8b61a45fc1ce5e4dbd1e4\"" Dec 13 14:34:15.155192 env[1734]: time="2024-12-13T14:34:15.153750681Z" level=info msg="StartContainer for \"d126b8e941633b05f0c4ea58922060a875d4bb311ac8b61a45fc1ce5e4dbd1e4\"" Dec 13 14:34:15.199282 systemd[1]: run-containerd-runc-k8s.io-d126b8e941633b05f0c4ea58922060a875d4bb311ac8b61a45fc1ce5e4dbd1e4-runc.nveQdx.mount: Deactivated successfully. Dec 13 14:34:15.213434 systemd[1]: Started cri-containerd-d126b8e941633b05f0c4ea58922060a875d4bb311ac8b61a45fc1ce5e4dbd1e4.scope. Dec 13 14:34:15.270000 audit[5400]: AVC avc: denied { perfmon } for pid=5400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.273536 kernel: kauditd_printk_skb: 200 callbacks suppressed Dec 13 14:34:15.273648 kernel: audit: type=1400 audit(1734100455.270:1371): avc: denied { perfmon } for pid=5400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.270000 audit[5400]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fc3c86c49a8 items=0 ppid=4789 pid=5400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:15.282977 kernel: audit: type=1300 audit(1734100455.270:1371): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fc3c86c49a8 items=0 ppid=4789 pid=5400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:15.283078 kernel: audit: type=1327 audit(1734100455.270:1371): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431323662386539343136333362303566306334656135383932323036 Dec 13 14:34:15.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431323662386539343136333362303566306334656135383932323036 Dec 13 14:34:15.288076 kernel: audit: type=1400 audit(1734100455.273:1372): avc: denied { bpf } for pid=5400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.273000 audit[5400]: AVC avc: denied { bpf } for pid=5400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.292491 kernel: audit: type=1400 audit(1734100455.273:1372): avc: denied { bpf } for pid=5400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.273000 audit[5400]: AVC avc: denied { bpf } for pid=5400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.295948 kernel: audit: type=1400 audit(1734100455.273:1372): avc: denied { bpf } for pid=5400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.273000 audit[5400]: AVC avc: denied { bpf } for pid=5400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.299302 kernel: audit: type=1400 audit(1734100455.273:1372): avc: denied { perfmon } for pid=5400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.273000 audit[5400]: AVC avc: denied { perfmon } for pid=5400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.306887 kernel: audit: type=1400 audit(1734100455.273:1372): avc: denied { perfmon } for pid=5400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.273000 audit[5400]: AVC avc: denied { perfmon } for pid=5400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.273000 audit[5400]: AVC avc: denied { perfmon } for pid=5400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.310895 kernel: audit: type=1400 audit(1734100455.273:1372): avc: denied { perfmon } for pid=5400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.314380 kernel: audit: type=1400 audit(1734100455.273:1372): avc: denied { perfmon } for pid=5400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.273000 audit[5400]: AVC avc: denied { perfmon } for pid=5400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.273000 audit[5400]: AVC avc: denied { perfmon } for pid=5400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.273000 audit[5400]: AVC avc: denied { bpf } for pid=5400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.273000 audit[5400]: AVC avc: denied { bpf } for pid=5400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.273000 audit: BPF prog-id=205 op=LOAD Dec 13 14:34:15.273000 audit[5400]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002d1d68 items=0 ppid=4789 pid=5400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:15.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431323662386539343136333362303566306334656135383932323036 Dec 13 14:34:15.287000 audit[5400]: AVC avc: denied { bpf } for pid=5400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.287000 audit[5400]: AVC avc: denied { bpf } for pid=5400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.287000 audit[5400]: AVC avc: denied { perfmon } for pid=5400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.287000 audit[5400]: AVC avc: denied { perfmon } for pid=5400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.287000 audit[5400]: AVC avc: denied { perfmon } for pid=5400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.287000 audit[5400]: AVC avc: denied { perfmon } for pid=5400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.287000 audit[5400]: AVC avc: denied { perfmon } for pid=5400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.287000 audit[5400]: AVC avc: denied { bpf } for pid=5400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.287000 audit[5400]: AVC avc: denied { bpf } for pid=5400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.287000 audit: BPF prog-id=206 op=LOAD Dec 13 14:34:15.287000 audit[5400]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002d1db8 items=0 ppid=4789 pid=5400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:15.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431323662386539343136333362303566306334656135383932323036 Dec 13 14:34:15.298000 audit: BPF prog-id=206 op=UNLOAD Dec 13 14:34:15.298000 audit: BPF prog-id=205 op=UNLOAD Dec 13 14:34:15.298000 audit[5400]: AVC avc: denied { bpf } for pid=5400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.298000 audit[5400]: AVC avc: denied { bpf } for pid=5400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.298000 audit[5400]: AVC avc: denied { bpf } for pid=5400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.298000 audit[5400]: AVC avc: denied { perfmon } for pid=5400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.298000 audit[5400]: AVC avc: denied { perfmon } for pid=5400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.298000 audit[5400]: AVC avc: denied { perfmon } for pid=5400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.298000 audit[5400]: AVC avc: denied { perfmon } for pid=5400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.298000 audit[5400]: AVC avc: denied { perfmon } for pid=5400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.298000 audit[5400]: AVC avc: denied { bpf } for pid=5400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.298000 audit[5400]: AVC avc: denied { bpf } for pid=5400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:15.298000 audit: BPF prog-id=207 op=LOAD Dec 13 14:34:15.298000 audit[5400]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002d1e48 items=0 ppid=4789 pid=5400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:15.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431323662386539343136333362303566306334656135383932323036 Dec 13 14:34:15.336669 env[1734]: time="2024-12-13T14:34:15.336590117Z" level=info msg="StartContainer for \"d126b8e941633b05f0c4ea58922060a875d4bb311ac8b61a45fc1ce5e4dbd1e4\" returns successfully" Dec 13 14:34:16.327246 kubelet[2802]: I1213 14:34:16.326756 2802 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:34:16.328719 kubelet[2802]: I1213 14:34:16.328693 2802 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:34:17.478060 systemd[1]: Started sshd@9-172.31.19.209:22-139.178.89.65:39200.service. Dec 13 14:34:17.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.19.209:22-139.178.89.65:39200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:17.717000 audit[5452]: USER_ACCT pid=5452 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:17.720782 sshd[5452]: Accepted publickey for core from 139.178.89.65 port 39200 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:34:17.720000 audit[5452]: CRED_ACQ pid=5452 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:17.720000 audit[5452]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc22cabcc0 a2=3 a3=0 items=0 ppid=1 pid=5452 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:17.720000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:17.725494 sshd[5452]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:17.736217 systemd[1]: Started session-10.scope. Dec 13 14:34:17.737162 systemd-logind[1722]: New session 10 of user core. Dec 13 14:34:17.741000 audit[5452]: USER_START pid=5452 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:17.744000 audit[5454]: CRED_ACQ pid=5454 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:18.215756 sshd[5452]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:18.216000 audit[5452]: USER_END pid=5452 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:18.216000 audit[5452]: CRED_DISP pid=5452 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:18.219879 systemd[1]: sshd@9-172.31.19.209:22-139.178.89.65:39200.service: Deactivated successfully. Dec 13 14:34:18.220854 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 14:34:18.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.19.209:22-139.178.89.65:39200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:18.224738 systemd-logind[1722]: Session 10 logged out. Waiting for processes to exit. Dec 13 14:34:18.226703 systemd-logind[1722]: Removed session 10. Dec 13 14:34:23.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.19.209:22-139.178.89.65:42486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:23.244719 systemd[1]: Started sshd@10-172.31.19.209:22-139.178.89.65:42486.service. Dec 13 14:34:23.251221 kernel: kauditd_printk_skb: 44 callbacks suppressed Dec 13 14:34:23.251382 kernel: audit: type=1130 audit(1734100463.243:1386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.19.209:22-139.178.89.65:42486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:23.438000 audit[5472]: USER_ACCT pid=5472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:23.444988 sshd[5472]: Accepted publickey for core from 139.178.89.65 port 42486 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:34:23.445481 kernel: audit: type=1101 audit(1734100463.438:1387): pid=5472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:23.444000 audit[5472]: CRED_ACQ pid=5472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:23.446465 sshd[5472]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:23.460724 kernel: audit: type=1103 audit(1734100463.444:1388): pid=5472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:23.461658 kernel: audit: type=1006 audit(1734100463.444:1389): pid=5472 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 14:34:23.461722 kernel: audit: type=1300 audit(1734100463.444:1389): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe850bcd00 a2=3 a3=0 items=0 ppid=1 pid=5472 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:23.444000 audit[5472]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe850bcd00 a2=3 a3=0 items=0 ppid=1 pid=5472 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:23.444000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:23.468165 kernel: audit: type=1327 audit(1734100463.444:1389): proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:23.474099 systemd-logind[1722]: New session 11 of user core. Dec 13 14:34:23.475776 systemd[1]: Started session-11.scope. Dec 13 14:34:23.488000 audit[5472]: USER_START pid=5472 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:23.488000 audit[5474]: CRED_ACQ pid=5474 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:23.499936 kernel: audit: type=1105 audit(1734100463.488:1390): pid=5472 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:23.500186 kernel: audit: type=1103 audit(1734100463.488:1391): pid=5474 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:23.748873 sshd[5472]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:23.749000 audit[5472]: USER_END pid=5472 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:23.749000 audit[5472]: CRED_DISP pid=5472 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:23.759582 systemd[1]: sshd@10-172.31.19.209:22-139.178.89.65:42486.service: Deactivated successfully. Dec 13 14:34:23.760789 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 14:34:23.761906 kernel: audit: type=1106 audit(1734100463.749:1392): pid=5472 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:23.761952 kernel: audit: type=1104 audit(1734100463.749:1393): pid=5472 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:23.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.19.209:22-139.178.89.65:42486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:23.763102 systemd-logind[1722]: Session 11 logged out. Waiting for processes to exit. Dec 13 14:34:23.764402 systemd-logind[1722]: Removed session 11. Dec 13 14:34:23.776244 systemd[1]: Started sshd@11-172.31.19.209:22-139.178.89.65:42492.service. Dec 13 14:34:23.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.19.209:22-139.178.89.65:42492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:23.944000 audit[5485]: USER_ACCT pid=5485 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:23.945970 sshd[5485]: Accepted publickey for core from 139.178.89.65 port 42492 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:34:23.947000 audit[5485]: CRED_ACQ pid=5485 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:23.947000 audit[5485]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb13f6070 a2=3 a3=0 items=0 ppid=1 pid=5485 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:23.947000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:23.949716 sshd[5485]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:23.956703 systemd[1]: Started session-12.scope. Dec 13 14:34:23.957385 systemd-logind[1722]: New session 12 of user core. Dec 13 14:34:23.966000 audit[5485]: USER_START pid=5485 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:23.969000 audit[5487]: CRED_ACQ pid=5487 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:24.417376 sshd[5485]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:24.417000 audit[5485]: USER_END pid=5485 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:24.418000 audit[5485]: CRED_DISP pid=5485 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:24.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.19.209:22-139.178.89.65:42492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:24.423159 systemd[1]: sshd@11-172.31.19.209:22-139.178.89.65:42492.service: Deactivated successfully. Dec 13 14:34:24.426515 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 14:34:24.427925 systemd-logind[1722]: Session 12 logged out. Waiting for processes to exit. Dec 13 14:34:24.430141 systemd-logind[1722]: Removed session 12. Dec 13 14:34:24.443041 systemd[1]: Started sshd@12-172.31.19.209:22-139.178.89.65:42504.service. Dec 13 14:34:24.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.19.209:22-139.178.89.65:42504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:24.661000 audit[5494]: USER_ACCT pid=5494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:24.663039 sshd[5494]: Accepted publickey for core from 139.178.89.65 port 42504 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:34:24.662000 audit[5494]: CRED_ACQ pid=5494 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:24.663000 audit[5494]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff37844c10 a2=3 a3=0 items=0 ppid=1 pid=5494 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:24.663000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:24.668990 sshd[5494]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:24.693286 systemd[1]: Started session-13.scope. Dec 13 14:34:24.695643 systemd-logind[1722]: New session 13 of user core. Dec 13 14:34:24.714000 audit[5494]: USER_START pid=5494 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:24.717000 audit[5496]: CRED_ACQ pid=5496 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:25.048157 sshd[5494]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:25.049000 audit[5494]: USER_END pid=5494 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:25.049000 audit[5494]: CRED_DISP pid=5494 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:25.054915 systemd[1]: sshd@12-172.31.19.209:22-139.178.89.65:42504.service: Deactivated successfully. Dec 13 14:34:25.055949 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 14:34:25.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.19.209:22-139.178.89.65:42504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:25.058324 systemd-logind[1722]: Session 13 logged out. Waiting for processes to exit. Dec 13 14:34:25.060139 systemd-logind[1722]: Removed session 13. Dec 13 14:34:30.079295 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 14:34:30.079487 kernel: audit: type=1130 audit(1734100470.074:1413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.19.209:22-139.178.89.65:33002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:30.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.19.209:22-139.178.89.65:33002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:30.076018 systemd[1]: Started sshd@13-172.31.19.209:22-139.178.89.65:33002.service. Dec 13 14:34:30.258000 audit[5510]: USER_ACCT pid=5510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:30.270000 audit[5510]: CRED_ACQ pid=5510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:30.272673 sshd[5510]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:30.274251 sshd[5510]: Accepted publickey for core from 139.178.89.65 port 33002 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:34:30.276502 kernel: audit: type=1101 audit(1734100470.258:1414): pid=5510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:30.276664 kernel: audit: type=1103 audit(1734100470.270:1415): pid=5510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:30.279889 kernel: audit: type=1006 audit(1734100470.270:1416): pid=5510 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Dec 13 14:34:30.285233 kernel: audit: type=1300 audit(1734100470.270:1416): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5bf919e0 a2=3 a3=0 items=0 ppid=1 pid=5510 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:30.270000 audit[5510]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5bf919e0 a2=3 a3=0 items=0 ppid=1 pid=5510 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:30.285264 systemd[1]: Started session-14.scope. Dec 13 14:34:30.270000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:30.287031 systemd-logind[1722]: New session 14 of user core. Dec 13 14:34:30.288701 kernel: audit: type=1327 audit(1734100470.270:1416): proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:30.294000 audit[5510]: USER_START pid=5510 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:30.303204 kernel: audit: type=1105 audit(1734100470.294:1417): pid=5510 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:30.303320 kernel: audit: type=1103 audit(1734100470.301:1418): pid=5512 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:30.301000 audit[5512]: CRED_ACQ pid=5512 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:30.516295 sshd[5510]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:30.517000 audit[5510]: USER_END pid=5510 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:30.517000 audit[5510]: CRED_DISP pid=5510 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:30.529524 kernel: audit: type=1106 audit(1734100470.517:1419): pid=5510 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:30.529657 kernel: audit: type=1104 audit(1734100470.517:1420): pid=5510 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:30.529842 systemd[1]: sshd@13-172.31.19.209:22-139.178.89.65:33002.service: Deactivated successfully. Dec 13 14:34:30.530860 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 14:34:30.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.19.209:22-139.178.89.65:33002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:30.533257 systemd-logind[1722]: Session 14 logged out. Waiting for processes to exit. Dec 13 14:34:30.534855 systemd-logind[1722]: Removed session 14. Dec 13 14:34:33.469701 kubelet[2802]: I1213 14:34:33.462312 2802 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-x2vwj" podStartSLOduration=50.774816394 podStartE2EDuration="1m1.458178974s" podCreationTimestamp="2024-12-13 14:33:32 +0000 UTC" firstStartedPulling="2024-12-13 14:34:04.435206996 +0000 UTC m=+52.877583355" lastFinishedPulling="2024-12-13 14:34:15.118569567 +0000 UTC m=+63.560945935" observedRunningTime="2024-12-13 14:34:15.554760268 +0000 UTC m=+63.997136640" watchObservedRunningTime="2024-12-13 14:34:33.458178974 +0000 UTC m=+81.900555353" Dec 13 14:34:33.524082 env[1734]: time="2024-12-13T14:34:33.524038112Z" level=info msg="StopContainer for \"677487a39e974be7ed7115568487a3eed61572427bd2bf445bd289782cfcaeee\" with timeout 300 (s)" Dec 13 14:34:33.525468 env[1734]: time="2024-12-13T14:34:33.524794336Z" level=info msg="Stop container \"677487a39e974be7ed7115568487a3eed61572427bd2bf445bd289782cfcaeee\" with signal terminated" Dec 13 14:34:33.680000 audit[5532]: NETFILTER_CFG table=filter:123 family=2 entries=8 op=nft_register_rule pid=5532 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:33.680000 audit[5532]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd7461c5d0 a2=0 a3=7ffd7461c5bc items=0 ppid=2933 pid=5532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:33.680000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:33.685000 audit[5532]: NETFILTER_CFG table=nat:124 family=2 entries=30 op=nft_register_rule pid=5532 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:33.685000 audit[5532]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd7461c5d0 a2=0 a3=7ffd7461c5bc items=0 ppid=2933 pid=5532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:33.685000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:33.709000 audit[5534]: NETFILTER_CFG table=filter:125 family=2 entries=8 op=nft_register_rule pid=5534 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:33.709000 audit[5534]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdab5e8bb0 a2=0 a3=7ffdab5e8b9c items=0 ppid=2933 pid=5534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:33.709000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:33.716000 audit[5534]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=5534 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:33.716000 audit[5534]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdab5e8bb0 a2=0 a3=7ffdab5e8b9c items=0 ppid=2933 pid=5534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:33.716000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:33.878767 env[1734]: time="2024-12-13T14:34:33.878438000Z" level=info msg="StopContainer for \"6cca2d83872ba6d6708d498f7b766570f5e382bacd4f4c6d9b069ba54061298d\" with timeout 30 (s)" Dec 13 14:34:33.879204 env[1734]: time="2024-12-13T14:34:33.879076755Z" level=info msg="Stop container \"6cca2d83872ba6d6708d498f7b766570f5e382bacd4f4c6d9b069ba54061298d\" with signal terminated" Dec 13 14:34:33.912586 systemd[1]: cri-containerd-6cca2d83872ba6d6708d498f7b766570f5e382bacd4f4c6d9b069ba54061298d.scope: Deactivated successfully. Dec 13 14:34:33.911000 audit: BPF prog-id=190 op=UNLOAD Dec 13 14:34:33.916000 audit: BPF prog-id=193 op=UNLOAD Dec 13 14:34:33.986107 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6cca2d83872ba6d6708d498f7b766570f5e382bacd4f4c6d9b069ba54061298d-rootfs.mount: Deactivated successfully. Dec 13 14:34:33.988791 env[1734]: time="2024-12-13T14:34:33.988739100Z" level=info msg="shim disconnected" id=6cca2d83872ba6d6708d498f7b766570f5e382bacd4f4c6d9b069ba54061298d Dec 13 14:34:33.989309 env[1734]: time="2024-12-13T14:34:33.989278611Z" level=warning msg="cleaning up after shim disconnected" id=6cca2d83872ba6d6708d498f7b766570f5e382bacd4f4c6d9b069ba54061298d namespace=k8s.io Dec 13 14:34:33.989464 env[1734]: time="2024-12-13T14:34:33.989445066Z" level=info msg="cleaning up dead shim" Dec 13 14:34:34.008956 env[1734]: time="2024-12-13T14:34:34.008842407Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:34:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5556 runtime=io.containerd.runc.v2\n" Dec 13 14:34:34.034565 env[1734]: time="2024-12-13T14:34:34.034514882Z" level=info msg="StopContainer for \"6cca2d83872ba6d6708d498f7b766570f5e382bacd4f4c6d9b069ba54061298d\" returns successfully" Dec 13 14:34:34.038123 env[1734]: time="2024-12-13T14:34:34.038080742Z" level=info msg="StopPodSandbox for \"c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50\"" Dec 13 14:34:34.038295 env[1734]: time="2024-12-13T14:34:34.038160647Z" level=info msg="Container to stop \"6cca2d83872ba6d6708d498f7b766570f5e382bacd4f4c6d9b069ba54061298d\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:34:34.048838 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50-shm.mount: Deactivated successfully. Dec 13 14:34:34.066573 systemd[1]: cri-containerd-c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50.scope: Deactivated successfully. Dec 13 14:34:34.065000 audit: BPF prog-id=162 op=UNLOAD Dec 13 14:34:34.073000 audit: BPF prog-id=165 op=UNLOAD Dec 13 14:34:34.109368 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50-rootfs.mount: Deactivated successfully. Dec 13 14:34:34.114694 env[1734]: time="2024-12-13T14:34:34.114642221Z" level=info msg="shim disconnected" id=c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50 Dec 13 14:34:34.114918 env[1734]: time="2024-12-13T14:34:34.114896334Z" level=warning msg="cleaning up after shim disconnected" id=c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50 namespace=k8s.io Dec 13 14:34:34.115017 env[1734]: time="2024-12-13T14:34:34.115002857Z" level=info msg="cleaning up dead shim" Dec 13 14:34:34.127581 env[1734]: time="2024-12-13T14:34:34.127544159Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:34:34Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5587 runtime=io.containerd.runc.v2\n" Dec 13 14:34:34.301254 systemd-networkd[1456]: calif77ca70f44f: Link DOWN Dec 13 14:34:34.301262 systemd-networkd[1456]: calif77ca70f44f: Lost carrier Dec 13 14:34:34.422000 audit[5625]: NETFILTER_CFG table=filter:127 family=2 entries=46 op=nft_register_rule pid=5625 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:34.422000 audit[5625]: SYSCALL arch=c000003e syscall=46 success=yes exit=7908 a0=3 a1=7ffd0f53be40 a2=0 a3=7ffd0f53be2c items=0 ppid=3956 pid=5625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.422000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:34.437000 audit[5625]: NETFILTER_CFG table=filter:128 family=2 entries=4 op=nft_unregister_chain pid=5625 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:34.437000 audit[5625]: SYSCALL arch=c000003e syscall=46 success=yes exit=592 a0=3 a1=7ffd0f53be40 a2=0 a3=5638af31b000 items=0 ppid=3956 pid=5625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:34.437000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:34.626935 kubelet[2802]: I1213 14:34:34.626836 2802 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Dec 13 14:34:34.686559 env[1734]: 2024-12-13 14:34:34.294 [INFO][5613] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Dec 13 14:34:34.686559 env[1734]: 2024-12-13 14:34:34.295 [INFO][5613] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" iface="eth0" netns="/var/run/netns/cni-f03e1931-2832-799f-56c6-13d9c0416f3f" Dec 13 14:34:34.686559 env[1734]: 2024-12-13 14:34:34.295 [INFO][5613] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" iface="eth0" netns="/var/run/netns/cni-f03e1931-2832-799f-56c6-13d9c0416f3f" Dec 13 14:34:34.686559 env[1734]: 2024-12-13 14:34:34.424 [INFO][5613] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" after=129.106323ms iface="eth0" netns="/var/run/netns/cni-f03e1931-2832-799f-56c6-13d9c0416f3f" Dec 13 14:34:34.686559 env[1734]: 2024-12-13 14:34:34.424 [INFO][5613] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Dec 13 14:34:34.686559 env[1734]: 2024-12-13 14:34:34.424 [INFO][5613] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Dec 13 14:34:34.686559 env[1734]: 2024-12-13 14:34:34.488 [INFO][5626] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" HandleID="k8s-pod-network.c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Workload="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" Dec 13 14:34:34.686559 env[1734]: 2024-12-13 14:34:34.488 [INFO][5626] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:34.686559 env[1734]: 2024-12-13 14:34:34.488 [INFO][5626] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:34.686559 env[1734]: 2024-12-13 14:34:34.672 [INFO][5626] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" HandleID="k8s-pod-network.c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Workload="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" Dec 13 14:34:34.686559 env[1734]: 2024-12-13 14:34:34.673 [INFO][5626] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" HandleID="k8s-pod-network.c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Workload="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" Dec 13 14:34:34.686559 env[1734]: 2024-12-13 14:34:34.680 [INFO][5626] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:34.686559 env[1734]: 2024-12-13 14:34:34.683 [INFO][5613] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Dec 13 14:34:34.691494 systemd[1]: run-netns-cni\x2df03e1931\x2d2832\x2d799f\x2d56c6\x2d13d9c0416f3f.mount: Deactivated successfully. Dec 13 14:34:34.693254 env[1734]: time="2024-12-13T14:34:34.692780211Z" level=info msg="TearDown network for sandbox \"c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50\" successfully" Dec 13 14:34:34.693254 env[1734]: time="2024-12-13T14:34:34.692831372Z" level=info msg="StopPodSandbox for \"c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50\" returns successfully" Dec 13 14:34:34.860730 kubelet[2802]: I1213 14:34:34.860623 2802 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-hmk2q\" (UniqueName: \"kubernetes.io/projected/dca070a3-4cd0-4f67-ba56-957513d4401c-kube-api-access-hmk2q\") pod \"dca070a3-4cd0-4f67-ba56-957513d4401c\" (UID: \"dca070a3-4cd0-4f67-ba56-957513d4401c\") " Dec 13 14:34:34.861029 kubelet[2802]: I1213 14:34:34.861014 2802 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/dca070a3-4cd0-4f67-ba56-957513d4401c-tigera-ca-bundle\") pod \"dca070a3-4cd0-4f67-ba56-957513d4401c\" (UID: \"dca070a3-4cd0-4f67-ba56-957513d4401c\") " Dec 13 14:34:34.914127 systemd[1]: var-lib-kubelet-pods-dca070a3\x2d4cd0\x2d4f67\x2dba56\x2d957513d4401c-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dhmk2q.mount: Deactivated successfully. Dec 13 14:34:34.920380 kubelet[2802]: I1213 14:34:34.920276 2802 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/dca070a3-4cd0-4f67-ba56-957513d4401c-kube-api-access-hmk2q" (OuterVolumeSpecName: "kube-api-access-hmk2q") pod "dca070a3-4cd0-4f67-ba56-957513d4401c" (UID: "dca070a3-4cd0-4f67-ba56-957513d4401c"). InnerVolumeSpecName "kube-api-access-hmk2q". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 14:34:34.927038 kubelet[2802]: I1213 14:34:34.926861 2802 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/dca070a3-4cd0-4f67-ba56-957513d4401c-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "dca070a3-4cd0-4f67-ba56-957513d4401c" (UID: "dca070a3-4cd0-4f67-ba56-957513d4401c"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 14:34:34.963208 kubelet[2802]: I1213 14:34:34.963168 2802 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-hmk2q\" (UniqueName: \"kubernetes.io/projected/dca070a3-4cd0-4f67-ba56-957513d4401c-kube-api-access-hmk2q\") on node \"ip-172-31-19-209\" DevicePath \"\"" Dec 13 14:34:34.963208 kubelet[2802]: I1213 14:34:34.963205 2802 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/dca070a3-4cd0-4f67-ba56-957513d4401c-tigera-ca-bundle\") on node \"ip-172-31-19-209\" DevicePath \"\"" Dec 13 14:34:34.982231 systemd[1]: var-lib-kubelet-pods-dca070a3\x2d4cd0\x2d4f67\x2dba56\x2d957513d4401c-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dkube\x2dcontrollers-1.mount: Deactivated successfully. Dec 13 14:34:35.542505 systemd[1]: Started sshd@14-172.31.19.209:22-139.178.89.65:33018.service. Dec 13 14:34:35.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.19.209:22-139.178.89.65:33018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:35.554516 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 14:34:35.554752 kernel: audit: type=1130 audit(1734100475.545:1432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.19.209:22-139.178.89.65:33018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:35.643033 systemd[1]: Removed slice kubepods-besteffort-poddca070a3_4cd0_4f67_ba56_957513d4401c.slice. Dec 13 14:34:35.715747 kubelet[2802]: I1213 14:34:35.715697 2802 topology_manager.go:215] "Topology Admit Handler" podUID="4f8eebfe-379c-42eb-a648-d0cde665487d" podNamespace="calico-system" podName="calico-kube-controllers-b668dfd99-47nqd" Dec 13 14:34:35.727002 kubelet[2802]: E1213 14:34:35.726969 2802 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="dca070a3-4cd0-4f67-ba56-957513d4401c" containerName="calico-kube-controllers" Dec 13 14:34:35.730256 kubelet[2802]: I1213 14:34:35.730223 2802 memory_manager.go:354] "RemoveStaleState removing state" podUID="dca070a3-4cd0-4f67-ba56-957513d4401c" containerName="calico-kube-controllers" Dec 13 14:34:35.747207 systemd[1]: Created slice kubepods-besteffort-pod4f8eebfe_379c_42eb_a648_d0cde665487d.slice. Dec 13 14:34:35.792802 sshd[5642]: Accepted publickey for core from 139.178.89.65 port 33018 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:34:35.789000 audit[5642]: USER_ACCT pid=5642 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:35.799374 kernel: audit: type=1101 audit(1734100475.789:1433): pid=5642 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:35.791000 audit[5642]: CRED_ACQ pid=5642 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:35.806875 sshd[5642]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:35.807625 kernel: audit: type=1103 audit(1734100475.791:1434): pid=5642 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:35.821316 kernel: audit: type=1006 audit(1734100475.791:1435): pid=5642 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 14:34:35.833053 kernel: audit: type=1300 audit(1734100475.791:1435): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0e4630f0 a2=3 a3=0 items=0 ppid=1 pid=5642 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.833217 kernel: audit: type=1327 audit(1734100475.791:1435): proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:35.791000 audit[5642]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0e4630f0 a2=3 a3=0 items=0 ppid=1 pid=5642 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:35.791000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:35.837222 systemd[1]: Started session-15.scope. Dec 13 14:34:35.839908 systemd-logind[1722]: New session 15 of user core. Dec 13 14:34:35.846000 audit[5642]: USER_START pid=5642 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:35.854485 kernel: audit: type=1105 audit(1734100475.846:1436): pid=5642 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:35.854000 audit[5649]: CRED_ACQ pid=5649 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:35.861399 kernel: audit: type=1103 audit(1734100475.854:1437): pid=5649 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:35.871102 kubelet[2802]: I1213 14:34:35.871056 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4f8eebfe-379c-42eb-a648-d0cde665487d-tigera-ca-bundle\") pod \"calico-kube-controllers-b668dfd99-47nqd\" (UID: \"4f8eebfe-379c-42eb-a648-d0cde665487d\") " pod="calico-system/calico-kube-controllers-b668dfd99-47nqd" Dec 13 14:34:35.871410 kubelet[2802]: I1213 14:34:35.871343 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bpb8q\" (UniqueName: \"kubernetes.io/projected/4f8eebfe-379c-42eb-a648-d0cde665487d-kube-api-access-bpb8q\") pod \"calico-kube-controllers-b668dfd99-47nqd\" (UID: \"4f8eebfe-379c-42eb-a648-d0cde665487d\") " pod="calico-system/calico-kube-controllers-b668dfd99-47nqd" Dec 13 14:34:35.949852 kubelet[2802]: I1213 14:34:35.949803 2802 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="dca070a3-4cd0-4f67-ba56-957513d4401c" path="/var/lib/kubelet/pods/dca070a3-4cd0-4f67-ba56-957513d4401c/volumes" Dec 13 14:34:36.059516 env[1734]: time="2024-12-13T14:34:36.059400966Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-b668dfd99-47nqd,Uid:4f8eebfe-379c-42eb-a648-d0cde665487d,Namespace:calico-system,Attempt:0,}" Dec 13 14:34:36.431894 (udev-worker)[5622]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:34:36.434536 systemd-networkd[1456]: cali6f25bd5b713: Link UP Dec 13 14:34:36.438483 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:34:36.438610 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6f25bd5b713: link becomes ready Dec 13 14:34:36.438978 systemd-networkd[1456]: cali6f25bd5b713: Gained carrier Dec 13 14:34:36.463820 env[1734]: 2024-12-13 14:34:36.213 [INFO][5661] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--19--209-k8s-calico--kube--controllers--b668dfd99--47nqd-eth0 calico-kube-controllers-b668dfd99- calico-system 4f8eebfe-379c-42eb-a648-d0cde665487d 1178 0 2024-12-13 14:34:35 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:b668dfd99 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-19-209 calico-kube-controllers-b668dfd99-47nqd eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali6f25bd5b713 [] []}} ContainerID="248414981693d8adfdc870dd1afc061a11af86820cffe1ea26972aab62e88627" Namespace="calico-system" Pod="calico-kube-controllers-b668dfd99-47nqd" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--kube--controllers--b668dfd99--47nqd-" Dec 13 14:34:36.463820 env[1734]: 2024-12-13 14:34:36.214 [INFO][5661] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="248414981693d8adfdc870dd1afc061a11af86820cffe1ea26972aab62e88627" Namespace="calico-system" Pod="calico-kube-controllers-b668dfd99-47nqd" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--kube--controllers--b668dfd99--47nqd-eth0" Dec 13 14:34:36.463820 env[1734]: 2024-12-13 14:34:36.300 [INFO][5675] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="248414981693d8adfdc870dd1afc061a11af86820cffe1ea26972aab62e88627" HandleID="k8s-pod-network.248414981693d8adfdc870dd1afc061a11af86820cffe1ea26972aab62e88627" Workload="ip--172--31--19--209-k8s-calico--kube--controllers--b668dfd99--47nqd-eth0" Dec 13 14:34:36.463820 env[1734]: 2024-12-13 14:34:36.338 [INFO][5675] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="248414981693d8adfdc870dd1afc061a11af86820cffe1ea26972aab62e88627" HandleID="k8s-pod-network.248414981693d8adfdc870dd1afc061a11af86820cffe1ea26972aab62e88627" Workload="ip--172--31--19--209-k8s-calico--kube--controllers--b668dfd99--47nqd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000310960), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-19-209", "pod":"calico-kube-controllers-b668dfd99-47nqd", "timestamp":"2024-12-13 14:34:36.300191907 +0000 UTC"}, Hostname:"ip-172-31-19-209", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:34:36.463820 env[1734]: 2024-12-13 14:34:36.338 [INFO][5675] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:36.463820 env[1734]: 2024-12-13 14:34:36.338 [INFO][5675] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:36.463820 env[1734]: 2024-12-13 14:34:36.338 [INFO][5675] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-19-209' Dec 13 14:34:36.463820 env[1734]: 2024-12-13 14:34:36.344 [INFO][5675] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.248414981693d8adfdc870dd1afc061a11af86820cffe1ea26972aab62e88627" host="ip-172-31-19-209" Dec 13 14:34:36.463820 env[1734]: 2024-12-13 14:34:36.364 [INFO][5675] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-19-209" Dec 13 14:34:36.463820 env[1734]: 2024-12-13 14:34:36.383 [INFO][5675] ipam/ipam.go 489: Trying affinity for 192.168.66.64/26 host="ip-172-31-19-209" Dec 13 14:34:36.463820 env[1734]: 2024-12-13 14:34:36.389 [INFO][5675] ipam/ipam.go 155: Attempting to load block cidr=192.168.66.64/26 host="ip-172-31-19-209" Dec 13 14:34:36.463820 env[1734]: 2024-12-13 14:34:36.394 [INFO][5675] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.66.64/26 host="ip-172-31-19-209" Dec 13 14:34:36.463820 env[1734]: 2024-12-13 14:34:36.394 [INFO][5675] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.66.64/26 handle="k8s-pod-network.248414981693d8adfdc870dd1afc061a11af86820cffe1ea26972aab62e88627" host="ip-172-31-19-209" Dec 13 14:34:36.463820 env[1734]: 2024-12-13 14:34:36.397 [INFO][5675] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.248414981693d8adfdc870dd1afc061a11af86820cffe1ea26972aab62e88627 Dec 13 14:34:36.463820 env[1734]: 2024-12-13 14:34:36.409 [INFO][5675] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.66.64/26 handle="k8s-pod-network.248414981693d8adfdc870dd1afc061a11af86820cffe1ea26972aab62e88627" host="ip-172-31-19-209" Dec 13 14:34:36.463820 env[1734]: 2024-12-13 14:34:36.424 [INFO][5675] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.66.71/26] block=192.168.66.64/26 handle="k8s-pod-network.248414981693d8adfdc870dd1afc061a11af86820cffe1ea26972aab62e88627" host="ip-172-31-19-209" Dec 13 14:34:36.463820 env[1734]: 2024-12-13 14:34:36.424 [INFO][5675] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.66.71/26] handle="k8s-pod-network.248414981693d8adfdc870dd1afc061a11af86820cffe1ea26972aab62e88627" host="ip-172-31-19-209" Dec 13 14:34:36.463820 env[1734]: 2024-12-13 14:34:36.424 [INFO][5675] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:36.463820 env[1734]: 2024-12-13 14:34:36.424 [INFO][5675] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.71/26] IPv6=[] ContainerID="248414981693d8adfdc870dd1afc061a11af86820cffe1ea26972aab62e88627" HandleID="k8s-pod-network.248414981693d8adfdc870dd1afc061a11af86820cffe1ea26972aab62e88627" Workload="ip--172--31--19--209-k8s-calico--kube--controllers--b668dfd99--47nqd-eth0" Dec 13 14:34:36.465108 env[1734]: 2024-12-13 14:34:36.427 [INFO][5661] cni-plugin/k8s.go 386: Populated endpoint ContainerID="248414981693d8adfdc870dd1afc061a11af86820cffe1ea26972aab62e88627" Namespace="calico-system" Pod="calico-kube-controllers-b668dfd99-47nqd" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--kube--controllers--b668dfd99--47nqd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--209-k8s-calico--kube--controllers--b668dfd99--47nqd-eth0", GenerateName:"calico-kube-controllers-b668dfd99-", Namespace:"calico-system", SelfLink:"", UID:"4f8eebfe-379c-42eb-a648-d0cde665487d", ResourceVersion:"1178", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"b668dfd99", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-209", ContainerID:"", Pod:"calico-kube-controllers-b668dfd99-47nqd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.66.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6f25bd5b713", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:36.465108 env[1734]: 2024-12-13 14:34:36.427 [INFO][5661] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.66.71/32] ContainerID="248414981693d8adfdc870dd1afc061a11af86820cffe1ea26972aab62e88627" Namespace="calico-system" Pod="calico-kube-controllers-b668dfd99-47nqd" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--kube--controllers--b668dfd99--47nqd-eth0" Dec 13 14:34:36.465108 env[1734]: 2024-12-13 14:34:36.427 [INFO][5661] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6f25bd5b713 ContainerID="248414981693d8adfdc870dd1afc061a11af86820cffe1ea26972aab62e88627" Namespace="calico-system" Pod="calico-kube-controllers-b668dfd99-47nqd" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--kube--controllers--b668dfd99--47nqd-eth0" Dec 13 14:34:36.465108 env[1734]: 2024-12-13 14:34:36.441 [INFO][5661] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="248414981693d8adfdc870dd1afc061a11af86820cffe1ea26972aab62e88627" Namespace="calico-system" Pod="calico-kube-controllers-b668dfd99-47nqd" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--kube--controllers--b668dfd99--47nqd-eth0" Dec 13 14:34:36.465108 env[1734]: 2024-12-13 14:34:36.441 [INFO][5661] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="248414981693d8adfdc870dd1afc061a11af86820cffe1ea26972aab62e88627" Namespace="calico-system" Pod="calico-kube-controllers-b668dfd99-47nqd" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--kube--controllers--b668dfd99--47nqd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--209-k8s-calico--kube--controllers--b668dfd99--47nqd-eth0", GenerateName:"calico-kube-controllers-b668dfd99-", Namespace:"calico-system", SelfLink:"", UID:"4f8eebfe-379c-42eb-a648-d0cde665487d", ResourceVersion:"1178", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 34, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"b668dfd99", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-209", ContainerID:"248414981693d8adfdc870dd1afc061a11af86820cffe1ea26972aab62e88627", Pod:"calico-kube-controllers-b668dfd99-47nqd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.66.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6f25bd5b713", MAC:"9a:79:b3:43:49:ce", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:36.465108 env[1734]: 2024-12-13 14:34:36.461 [INFO][5661] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="248414981693d8adfdc870dd1afc061a11af86820cffe1ea26972aab62e88627" Namespace="calico-system" Pod="calico-kube-controllers-b668dfd99-47nqd" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--kube--controllers--b668dfd99--47nqd-eth0" Dec 13 14:34:36.522743 env[1734]: time="2024-12-13T14:34:36.521936187Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:34:36.522743 env[1734]: time="2024-12-13T14:34:36.522016051Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:34:36.522743 env[1734]: time="2024-12-13T14:34:36.522048313Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:34:36.522743 env[1734]: time="2024-12-13T14:34:36.522450279Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/248414981693d8adfdc870dd1afc061a11af86820cffe1ea26972aab62e88627 pid=5700 runtime=io.containerd.runc.v2 Dec 13 14:34:36.662557 systemd[1]: Started cri-containerd-248414981693d8adfdc870dd1afc061a11af86820cffe1ea26972aab62e88627.scope. Dec 13 14:34:36.686853 kernel: audit: type=1325 audit(1734100476.680:1438): table=filter:129 family=2 entries=56 op=nft_register_chain pid=5723 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:36.680000 audit[5723]: NETFILTER_CFG table=filter:129 family=2 entries=56 op=nft_register_chain pid=5723 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:34:36.680000 audit[5723]: SYSCALL arch=c000003e syscall=46 success=yes exit=26244 a0=3 a1=7ffc169b1390 a2=0 a3=7ffc169b137c items=0 ppid=3956 pid=5723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:36.694472 kernel: audit: type=1300 audit(1734100476.680:1438): arch=c000003e syscall=46 success=yes exit=26244 a0=3 a1=7ffc169b1390 a2=0 a3=7ffc169b137c items=0 ppid=3956 pid=5723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:36.680000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:34:36.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.778000 audit: BPF prog-id=208 op=LOAD Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=5700 pid=5712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:36.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234383431343938313639336438616466646338373064643161666330 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=5700 pid=5712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:36.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234383431343938313639336438616466646338373064643161666330 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit: BPF prog-id=209 op=LOAD Dec 13 14:34:36.780000 audit[5712]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001c4150 items=0 ppid=5700 pid=5712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:36.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234383431343938313639336438616466646338373064643161666330 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit: BPF prog-id=210 op=LOAD Dec 13 14:34:36.780000 audit[5712]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001c4198 items=0 ppid=5700 pid=5712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:36.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234383431343938313639336438616466646338373064643161666330 Dec 13 14:34:36.780000 audit: BPF prog-id=210 op=UNLOAD Dec 13 14:34:36.780000 audit: BPF prog-id=209 op=UNLOAD Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { perfmon } for pid=5712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit[5712]: AVC avc: denied { bpf } for pid=5712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:36.780000 audit: BPF prog-id=211 op=LOAD Dec 13 14:34:36.780000 audit[5712]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001c45a8 items=0 ppid=5700 pid=5712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:36.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234383431343938313639336438616466646338373064643161666330 Dec 13 14:34:36.924651 env[1734]: time="2024-12-13T14:34:36.924150141Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-b668dfd99-47nqd,Uid:4f8eebfe-379c-42eb-a648-d0cde665487d,Namespace:calico-system,Attempt:0,} returns sandbox id \"248414981693d8adfdc870dd1afc061a11af86820cffe1ea26972aab62e88627\"" Dec 13 14:34:37.136584 env[1734]: time="2024-12-13T14:34:37.136535615Z" level=info msg="CreateContainer within sandbox \"248414981693d8adfdc870dd1afc061a11af86820cffe1ea26972aab62e88627\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:34:37.171814 env[1734]: time="2024-12-13T14:34:37.171759739Z" level=info msg="CreateContainer within sandbox \"248414981693d8adfdc870dd1afc061a11af86820cffe1ea26972aab62e88627\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"e9f9640baa8851deff6e9852ec6bdc20abab7903ee903736adb4cd7d8d5df4a0\"" Dec 13 14:34:37.185386 env[1734]: time="2024-12-13T14:34:37.180512055Z" level=info msg="StartContainer for \"e9f9640baa8851deff6e9852ec6bdc20abab7903ee903736adb4cd7d8d5df4a0\"" Dec 13 14:34:37.297000 audit[5642]: USER_END pid=5642 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:37.297000 audit[5642]: CRED_DISP pid=5642 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:37.298595 systemd[1]: Started cri-containerd-e9f9640baa8851deff6e9852ec6bdc20abab7903ee903736adb4cd7d8d5df4a0.scope. Dec 13 14:34:37.294066 sshd[5642]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:37.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.19.209:22-139.178.89.65:33018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:37.300955 systemd[1]: sshd@14-172.31.19.209:22-139.178.89.65:33018.service: Deactivated successfully. Dec 13 14:34:37.302278 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 14:34:37.306149 systemd-logind[1722]: Session 15 logged out. Waiting for processes to exit. Dec 13 14:34:37.309433 systemd-logind[1722]: Removed session 15. Dec 13 14:34:37.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.343000 audit: BPF prog-id=212 op=LOAD Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { bpf } for pid=5763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=5700 pid=5763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:37.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539663936343062616138383531646566663665393835326563366264 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { perfmon } for pid=5763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=5700 pid=5763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:37.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539663936343062616138383531646566663665393835326563366264 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { bpf } for pid=5763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { bpf } for pid=5763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { bpf } for pid=5763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { perfmon } for pid=5763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { perfmon } for pid=5763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { perfmon } for pid=5763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { perfmon } for pid=5763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { perfmon } for pid=5763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { bpf } for pid=5763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { bpf } for pid=5763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit: BPF prog-id=213 op=LOAD Dec 13 14:34:37.344000 audit[5763]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000231500 items=0 ppid=5700 pid=5763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:37.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539663936343062616138383531646566663665393835326563366264 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { bpf } for pid=5763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { bpf } for pid=5763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { perfmon } for pid=5763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { perfmon } for pid=5763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { perfmon } for pid=5763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { perfmon } for pid=5763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { perfmon } for pid=5763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { bpf } for pid=5763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { bpf } for pid=5763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit: BPF prog-id=214 op=LOAD Dec 13 14:34:37.344000 audit[5763]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000231548 items=0 ppid=5700 pid=5763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:37.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539663936343062616138383531646566663665393835326563366264 Dec 13 14:34:37.344000 audit: BPF prog-id=214 op=UNLOAD Dec 13 14:34:37.344000 audit: BPF prog-id=213 op=UNLOAD Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { bpf } for pid=5763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { bpf } for pid=5763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { bpf } for pid=5763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { perfmon } for pid=5763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { perfmon } for pid=5763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { perfmon } for pid=5763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { perfmon } for pid=5763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { perfmon } for pid=5763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { bpf } for pid=5763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit[5763]: AVC avc: denied { bpf } for pid=5763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:37.344000 audit: BPF prog-id=215 op=LOAD Dec 13 14:34:37.344000 audit[5763]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000231958 items=0 ppid=5700 pid=5763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:37.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539663936343062616138383531646566663665393835326563366264 Dec 13 14:34:37.465946 env[1734]: time="2024-12-13T14:34:37.464953894Z" level=info msg="StartContainer for \"e9f9640baa8851deff6e9852ec6bdc20abab7903ee903736adb4cd7d8d5df4a0\" returns successfully" Dec 13 14:34:37.724554 systemd-networkd[1456]: cali6f25bd5b713: Gained IPv6LL Dec 13 14:34:37.860005 systemd[1]: cri-containerd-677487a39e974be7ed7115568487a3eed61572427bd2bf445bd289782cfcaeee.scope: Deactivated successfully. Dec 13 14:34:37.858000 audit: BPF prog-id=126 op=UNLOAD Dec 13 14:34:37.861000 audit: BPF prog-id=129 op=UNLOAD Dec 13 14:34:37.950042 env[1734]: time="2024-12-13T14:34:37.949968663Z" level=info msg="shim disconnected" id=677487a39e974be7ed7115568487a3eed61572427bd2bf445bd289782cfcaeee Dec 13 14:34:37.950042 env[1734]: time="2024-12-13T14:34:37.950038321Z" level=warning msg="cleaning up after shim disconnected" id=677487a39e974be7ed7115568487a3eed61572427bd2bf445bd289782cfcaeee namespace=k8s.io Dec 13 14:34:37.950236 env[1734]: time="2024-12-13T14:34:37.950051300Z" level=info msg="cleaning up dead shim" Dec 13 14:34:37.966963 env[1734]: time="2024-12-13T14:34:37.966908612Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:34:37Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5811 runtime=io.containerd.runc.v2\n" Dec 13 14:34:38.013044 env[1734]: time="2024-12-13T14:34:38.012622676Z" level=info msg="StopContainer for \"677487a39e974be7ed7115568487a3eed61572427bd2bf445bd289782cfcaeee\" returns successfully" Dec 13 14:34:38.013836 env[1734]: time="2024-12-13T14:34:38.013801027Z" level=info msg="StopPodSandbox for \"136af3ff9b47286354bc2ff4b3a5eff73d95718e1856bbf3f260d78fa5a7ee4a\"" Dec 13 14:34:38.014265 env[1734]: time="2024-12-13T14:34:38.014234947Z" level=info msg="Container to stop \"677487a39e974be7ed7115568487a3eed61572427bd2bf445bd289782cfcaeee\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:34:38.022000 audit: BPF prog-id=118 op=UNLOAD Dec 13 14:34:38.024128 systemd[1]: cri-containerd-136af3ff9b47286354bc2ff4b3a5eff73d95718e1856bbf3f260d78fa5a7ee4a.scope: Deactivated successfully. Dec 13 14:34:38.026000 audit: BPF prog-id=121 op=UNLOAD Dec 13 14:34:38.067384 kubelet[2802]: I1213 14:34:38.066991 2802 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-b668dfd99-47nqd" podStartSLOduration=3.05298247 podStartE2EDuration="3.05298247s" podCreationTimestamp="2024-12-13 14:34:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:34:37.943450716 +0000 UTC m=+86.385827091" watchObservedRunningTime="2024-12-13 14:34:38.05298247 +0000 UTC m=+86.495358846" Dec 13 14:34:38.084401 env[1734]: time="2024-12-13T14:34:38.084321674Z" level=info msg="shim disconnected" id=136af3ff9b47286354bc2ff4b3a5eff73d95718e1856bbf3f260d78fa5a7ee4a Dec 13 14:34:38.084575 env[1734]: time="2024-12-13T14:34:38.084407960Z" level=warning msg="cleaning up after shim disconnected" id=136af3ff9b47286354bc2ff4b3a5eff73d95718e1856bbf3f260d78fa5a7ee4a namespace=k8s.io Dec 13 14:34:38.084575 env[1734]: time="2024-12-13T14:34:38.084421952Z" level=info msg="cleaning up dead shim" Dec 13 14:34:38.100836 env[1734]: time="2024-12-13T14:34:38.100799482Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:34:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5858 runtime=io.containerd.runc.v2\n" Dec 13 14:34:38.116258 env[1734]: time="2024-12-13T14:34:38.116211315Z" level=info msg="TearDown network for sandbox \"136af3ff9b47286354bc2ff4b3a5eff73d95718e1856bbf3f260d78fa5a7ee4a\" successfully" Dec 13 14:34:38.116258 env[1734]: time="2024-12-13T14:34:38.116250598Z" level=info msg="StopPodSandbox for \"136af3ff9b47286354bc2ff4b3a5eff73d95718e1856bbf3f260d78fa5a7ee4a\" returns successfully" Dec 13 14:34:38.126419 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-677487a39e974be7ed7115568487a3eed61572427bd2bf445bd289782cfcaeee-rootfs.mount: Deactivated successfully. Dec 13 14:34:38.126872 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-136af3ff9b47286354bc2ff4b3a5eff73d95718e1856bbf3f260d78fa5a7ee4a-rootfs.mount: Deactivated successfully. Dec 13 14:34:38.127114 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-136af3ff9b47286354bc2ff4b3a5eff73d95718e1856bbf3f260d78fa5a7ee4a-shm.mount: Deactivated successfully. Dec 13 14:34:38.202000 audit[5877]: NETFILTER_CFG table=filter:130 family=2 entries=9 op=nft_register_rule pid=5877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:38.202000 audit[5877]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc183bc0f0 a2=0 a3=7ffc183bc0dc items=0 ppid=2933 pid=5877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:38.202000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:38.209000 audit[5877]: NETFILTER_CFG table=nat:131 family=2 entries=27 op=nft_unregister_chain pid=5877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:38.209000 audit[5877]: SYSCALL arch=c000003e syscall=46 success=yes exit=6028 a0=3 a1=7ffc183bc0f0 a2=0 a3=7ffc183bc0dc items=0 ppid=2933 pid=5877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:38.209000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:38.274101 kubelet[2802]: I1213 14:34:38.273990 2802 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-5bph2\" (UniqueName: \"kubernetes.io/projected/c42d8654-1498-4287-aa04-3add6f08431a-kube-api-access-5bph2\") pod \"c42d8654-1498-4287-aa04-3add6f08431a\" (UID: \"c42d8654-1498-4287-aa04-3add6f08431a\") " Dec 13 14:34:38.274101 kubelet[2802]: I1213 14:34:38.274053 2802 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/c42d8654-1498-4287-aa04-3add6f08431a-typha-certs\") pod \"c42d8654-1498-4287-aa04-3add6f08431a\" (UID: \"c42d8654-1498-4287-aa04-3add6f08431a\") " Dec 13 14:34:38.274101 kubelet[2802]: I1213 14:34:38.274092 2802 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c42d8654-1498-4287-aa04-3add6f08431a-tigera-ca-bundle\") pod \"c42d8654-1498-4287-aa04-3add6f08431a\" (UID: \"c42d8654-1498-4287-aa04-3add6f08431a\") " Dec 13 14:34:38.300550 kubelet[2802]: I1213 14:34:38.297010 2802 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/c42d8654-1498-4287-aa04-3add6f08431a-kube-api-access-5bph2" (OuterVolumeSpecName: "kube-api-access-5bph2") pod "c42d8654-1498-4287-aa04-3add6f08431a" (UID: "c42d8654-1498-4287-aa04-3add6f08431a"). InnerVolumeSpecName "kube-api-access-5bph2". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 14:34:38.300550 kubelet[2802]: I1213 14:34:38.298130 2802 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/c42d8654-1498-4287-aa04-3add6f08431a-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "c42d8654-1498-4287-aa04-3add6f08431a" (UID: "c42d8654-1498-4287-aa04-3add6f08431a"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 14:34:38.299107 systemd[1]: var-lib-kubelet-pods-c42d8654\x2d1498\x2d4287\x2daa04\x2d3add6f08431a-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully. Dec 13 14:34:38.303577 kubelet[2802]: I1213 14:34:38.303533 2802 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/c42d8654-1498-4287-aa04-3add6f08431a-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "c42d8654-1498-4287-aa04-3add6f08431a" (UID: "c42d8654-1498-4287-aa04-3add6f08431a"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Dec 13 14:34:38.304153 systemd[1]: var-lib-kubelet-pods-c42d8654\x2d1498\x2d4287\x2daa04\x2d3add6f08431a-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. Dec 13 14:34:38.304286 systemd[1]: var-lib-kubelet-pods-c42d8654\x2d1498\x2d4287\x2daa04\x2d3add6f08431a-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d5bph2.mount: Deactivated successfully. Dec 13 14:34:38.375144 kubelet[2802]: I1213 14:34:38.375099 2802 reconciler_common.go:289] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/c42d8654-1498-4287-aa04-3add6f08431a-typha-certs\") on node \"ip-172-31-19-209\" DevicePath \"\"" Dec 13 14:34:38.375144 kubelet[2802]: I1213 14:34:38.375142 2802 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c42d8654-1498-4287-aa04-3add6f08431a-tigera-ca-bundle\") on node \"ip-172-31-19-209\" DevicePath \"\"" Dec 13 14:34:38.375378 kubelet[2802]: I1213 14:34:38.375160 2802 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-5bph2\" (UniqueName: \"kubernetes.io/projected/c42d8654-1498-4287-aa04-3add6f08431a-kube-api-access-5bph2\") on node \"ip-172-31-19-209\" DevicePath \"\"" Dec 13 14:34:38.922579 kubelet[2802]: I1213 14:34:38.922539 2802 scope.go:117] "RemoveContainer" containerID="677487a39e974be7ed7115568487a3eed61572427bd2bf445bd289782cfcaeee" Dec 13 14:34:38.935600 systemd[1]: Removed slice kubepods-besteffort-podc42d8654_1498_4287_aa04_3add6f08431a.slice. Dec 13 14:34:38.941472 env[1734]: time="2024-12-13T14:34:38.941431017Z" level=info msg="RemoveContainer for \"677487a39e974be7ed7115568487a3eed61572427bd2bf445bd289782cfcaeee\"" Dec 13 14:34:38.951973 env[1734]: time="2024-12-13T14:34:38.951921648Z" level=info msg="RemoveContainer for \"677487a39e974be7ed7115568487a3eed61572427bd2bf445bd289782cfcaeee\" returns successfully" Dec 13 14:34:38.952918 kubelet[2802]: I1213 14:34:38.952885 2802 scope.go:117] "RemoveContainer" containerID="677487a39e974be7ed7115568487a3eed61572427bd2bf445bd289782cfcaeee" Dec 13 14:34:38.953382 env[1734]: time="2024-12-13T14:34:38.953224019Z" level=error msg="ContainerStatus for \"677487a39e974be7ed7115568487a3eed61572427bd2bf445bd289782cfcaeee\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"677487a39e974be7ed7115568487a3eed61572427bd2bf445bd289782cfcaeee\": not found" Dec 13 14:34:38.970690 kubelet[2802]: E1213 14:34:38.970603 2802 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"677487a39e974be7ed7115568487a3eed61572427bd2bf445bd289782cfcaeee\": not found" containerID="677487a39e974be7ed7115568487a3eed61572427bd2bf445bd289782cfcaeee" Dec 13 14:34:38.972524 kubelet[2802]: I1213 14:34:38.972476 2802 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"677487a39e974be7ed7115568487a3eed61572427bd2bf445bd289782cfcaeee"} err="failed to get container status \"677487a39e974be7ed7115568487a3eed61572427bd2bf445bd289782cfcaeee\": rpc error: code = NotFound desc = an error occurred when try to find container \"677487a39e974be7ed7115568487a3eed61572427bd2bf445bd289782cfcaeee\": not found" Dec 13 14:34:39.938136 kubelet[2802]: I1213 14:34:39.938091 2802 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="c42d8654-1498-4287-aa04-3add6f08431a" path="/var/lib/kubelet/pods/c42d8654-1498-4287-aa04-3add6f08431a/volumes" Dec 13 14:34:41.301530 kernel: kauditd_printk_skb: 128 callbacks suppressed Dec 13 14:34:41.301730 kernel: audit: type=1325 audit(1734100481.295:1484): table=filter:132 family=2 entries=9 op=nft_register_rule pid=5945 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:41.295000 audit[5945]: NETFILTER_CFG table=filter:132 family=2 entries=9 op=nft_register_rule pid=5945 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:41.310541 kernel: audit: type=1300 audit(1734100481.295:1484): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe555f8ae0 a2=0 a3=7ffe555f8acc items=0 ppid=2933 pid=5945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:41.295000 audit[5945]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe555f8ae0 a2=0 a3=7ffe555f8acc items=0 ppid=2933 pid=5945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:41.295000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:41.315531 kernel: audit: type=1327 audit(1734100481.295:1484): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:41.315577 kernel: audit: type=1325 audit(1734100481.309:1485): table=nat:133 family=2 entries=27 op=nft_register_chain pid=5945 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:41.309000 audit[5945]: NETFILTER_CFG table=nat:133 family=2 entries=27 op=nft_register_chain pid=5945 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:41.309000 audit[5945]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe555f8ae0 a2=0 a3=7ffe555f8acc items=0 ppid=2933 pid=5945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:41.309000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:41.335506 kernel: audit: type=1300 audit(1734100481.309:1485): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe555f8ae0 a2=0 a3=7ffe555f8acc items=0 ppid=2933 pid=5945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:41.335696 kernel: audit: type=1327 audit(1734100481.309:1485): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:42.157000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.157000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.165276 kernel: audit: type=1400 audit(1734100482.157:1486): avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.165425 kernel: audit: type=1400 audit(1734100482.157:1486): avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.157000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.170398 kernel: audit: type=1400 audit(1734100482.157:1486): avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.157000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.157000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.179503 kernel: audit: type=1400 audit(1734100482.157:1486): avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.157000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.157000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.157000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.157000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.157000 audit: BPF prog-id=216 op=LOAD Dec 13 14:34:42.157000 audit[5999]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec6bf7260 a2=98 a3=3 items=0 ppid=5965 pid=5999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.157000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:42.164000 audit: BPF prog-id=216 op=UNLOAD Dec 13 14:34:42.165000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.165000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.165000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.165000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.165000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.165000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.165000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.165000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.165000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.165000 audit: BPF prog-id=217 op=LOAD Dec 13 14:34:42.165000 audit[5999]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec6bf7040 a2=74 a3=540051 items=0 ppid=5965 pid=5999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.165000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:42.169000 audit: BPF prog-id=217 op=UNLOAD Dec 13 14:34:42.169000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.169000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.169000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.169000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.169000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.169000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.169000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.169000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.169000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.169000 audit: BPF prog-id=218 op=LOAD Dec 13 14:34:42.169000 audit[5999]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec6bf7070 a2=94 a3=2 items=0 ppid=5965 pid=5999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.169000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:42.170000 audit: BPF prog-id=218 op=UNLOAD Dec 13 14:34:42.304000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.304000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.304000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.304000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.304000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.304000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.304000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.304000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.304000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.304000 audit: BPF prog-id=219 op=LOAD Dec 13 14:34:42.304000 audit[5999]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec6bf6f30 a2=40 a3=1 items=0 ppid=5965 pid=5999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.304000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:42.304000 audit: BPF prog-id=219 op=UNLOAD Dec 13 14:34:42.304000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.304000 audit[5999]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffec6bf7000 a2=50 a3=7ffec6bf70e0 items=0 ppid=5965 pid=5999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.304000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:42.319000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.319000 audit[5999]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec6bf6f40 a2=28 a3=0 items=0 ppid=5965 pid=5999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.319000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:42.319000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.319000 audit[5999]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec6bf6f70 a2=28 a3=0 items=0 ppid=5965 pid=5999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.319000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:42.319000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.319000 audit[5999]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec6bf6e80 a2=28 a3=0 items=0 ppid=5965 pid=5999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.319000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:42.319000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.319000 audit[5999]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec6bf6f90 a2=28 a3=0 items=0 ppid=5965 pid=5999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.319000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:42.319000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.319000 audit[5999]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec6bf6f70 a2=28 a3=0 items=0 ppid=5965 pid=5999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.319000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:42.319000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.319000 audit[5999]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec6bf6f60 a2=28 a3=0 items=0 ppid=5965 pid=5999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.319000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:42.319000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.319000 audit[5999]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec6bf6f90 a2=28 a3=0 items=0 ppid=5965 pid=5999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.319000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:42.319000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.319000 audit[5999]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec6bf6f70 a2=28 a3=0 items=0 ppid=5965 pid=5999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.319000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:42.319000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.319000 audit[5999]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec6bf6f90 a2=28 a3=0 items=0 ppid=5965 pid=5999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.319000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:42.319000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.319000 audit[5999]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec6bf6f60 a2=28 a3=0 items=0 ppid=5965 pid=5999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.319000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:42.319000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.319000 audit[5999]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec6bf6fd0 a2=28 a3=0 items=0 ppid=5965 pid=5999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.319000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:42.319000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.319000 audit[5999]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffec6bf6d80 a2=50 a3=1 items=0 ppid=5965 pid=5999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.319000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:42.319000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.319000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.319000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.319000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.319000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.319000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.319000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.319000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.319000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.319000 audit: BPF prog-id=220 op=LOAD Dec 13 14:34:42.319000 audit[5999]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffec6bf6d80 a2=94 a3=5 items=0 ppid=5965 pid=5999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.319000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:42.319000 audit: BPF prog-id=220 op=UNLOAD Dec 13 14:34:42.319000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.319000 audit[5999]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffec6bf6e30 a2=50 a3=1 items=0 ppid=5965 pid=5999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.319000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:42.319000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.319000 audit[5999]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffec6bf6f50 a2=4 a3=38 items=0 ppid=5965 pid=5999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.319000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { confidentiality } for pid=5999 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:42.320000 audit[5999]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffec6bf6fa0 a2=94 a3=6 items=0 ppid=5965 pid=5999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { confidentiality } for pid=5999 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:42.320000 audit[5999]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffec6bf6750 a2=94 a3=83 items=0 ppid=5965 pid=5999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { perfmon } for pid=5999 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { bpf } for pid=5999 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.320000 audit[5999]: AVC avc: denied { confidentiality } for pid=5999 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:42.320000 audit[5999]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffec6bf6750 a2=94 a3=83 items=0 ppid=5965 pid=5999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:34:42.322000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.322000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.322000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.322000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.322000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.322000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.322000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.322000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.322000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.322000 audit: BPF prog-id=221 op=LOAD Dec 13 14:34:42.322000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe242456b0 a2=98 a3=3 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.322000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.322000 audit: BPF prog-id=221 op=UNLOAD Dec 13 14:34:42.322000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.322000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.322000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.322000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.322000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.322000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.322000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.322000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.322000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.322000 audit: BPF prog-id=222 op=LOAD Dec 13 14:34:42.322000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe24245490 a2=74 a3=540051 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.322000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.323000 audit: BPF prog-id=222 op=UNLOAD Dec 13 14:34:42.323000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.323000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.323000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.323000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.323000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.323000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.323000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.323000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.323000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.323000 audit: BPF prog-id=223 op=LOAD Dec 13 14:34:42.323000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe242454c0 a2=94 a3=2 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.323000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.323000 audit: BPF prog-id=223 op=UNLOAD Dec 13 14:34:42.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.19.209:22-139.178.89.65:47200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.330289 systemd[1]: Started sshd@15-172.31.19.209:22-139.178.89.65:47200.service. Dec 13 14:34:42.476000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.476000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.476000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.476000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.476000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.476000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.476000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.476000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.476000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.476000 audit: BPF prog-id=224 op=LOAD Dec 13 14:34:42.476000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe24245380 a2=40 a3=1 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.476000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.476000 audit: BPF prog-id=224 op=UNLOAD Dec 13 14:34:42.476000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.476000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe24245450 a2=50 a3=7ffe24245530 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.476000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.496000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.496000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe24245390 a2=28 a3=0 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.496000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.498000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.498000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe242453c0 a2=28 a3=0 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.498000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.498000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.498000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe242452d0 a2=28 a3=0 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.498000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.498000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.498000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe242453e0 a2=28 a3=0 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.498000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.498000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.498000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe242453c0 a2=28 a3=0 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.498000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.498000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.498000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe242453b0 a2=28 a3=0 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.498000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.499000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe242453e0 a2=28 a3=0 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.499000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.499000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe242453c0 a2=28 a3=0 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.499000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.499000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe242453e0 a2=28 a3=0 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.499000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.499000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe242453b0 a2=28 a3=0 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.499000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.499000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe24245420 a2=28 a3=0 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.499000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.499000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe242451d0 a2=50 a3=1 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.499000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.499000 audit: BPF prog-id=225 op=LOAD Dec 13 14:34:42.499000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe242451d0 a2=94 a3=5 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.499000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.499000 audit: BPF prog-id=225 op=UNLOAD Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.499000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe24245280 a2=50 a3=1 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.499000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.499000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe242453a0 a2=4 a3=38 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.499000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.499000 audit[6001]: AVC avc: denied { confidentiality } for pid=6001 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:42.499000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe242453f0 a2=94 a3=6 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.499000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.500000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.500000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.500000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.500000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.500000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.500000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.500000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.500000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.500000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.500000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.500000 audit[6001]: AVC avc: denied { confidentiality } for pid=6001 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:42.500000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe24244ba0 a2=94 a3=83 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.500000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.500000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.500000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.500000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.500000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.500000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.500000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.500000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.500000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.500000 audit[6001]: AVC avc: denied { perfmon } for pid=6001 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.500000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.500000 audit[6001]: AVC avc: denied { confidentiality } for pid=6001 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:34:42.500000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe24244ba0 a2=94 a3=83 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.500000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.500000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.500000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=0 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.500000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.501000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.501000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=3d items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.501000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.501000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.501000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=41 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.501000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.501000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.501000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=45 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.501000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.501000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.501000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=49 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.501000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.501000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.501000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=4d items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.501000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.501000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.501000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=51 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.501000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.501000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.501000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=52 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.501000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.501000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.501000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=53 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.501000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.501000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.501000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=54 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.501000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.506000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.506000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=55 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.506000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.506000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.506000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=56 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.506000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.506000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.506000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=57 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.506000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.506000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.506000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=58 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.506000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.506000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.506000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=59 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.506000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.506000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.506000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=5a items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.506000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.506000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.506000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=5b items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.506000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.506000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.506000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=5c items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.506000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.506000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.506000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=5d items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.506000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.506000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.506000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=5e items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.506000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.506000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.506000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=5f items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.506000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.506000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.506000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=60 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.506000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.506000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.506000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=61 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.506000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.506000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.506000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=62 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.506000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.506000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.506000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=63 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.506000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.507000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.507000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=64 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.507000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.507000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=65 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.507000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.507000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=66 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.507000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.507000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=67 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.507000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.507000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=6a items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.507000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.507000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=6d items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.507000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.507000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=6e items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.507000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.507000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=71 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.507000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.507000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=72 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.507000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.507000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=75 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.507000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.507000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=7a items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.507000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.507000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=7d items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.507000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.507000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=8a items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.507000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.507000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=9e items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.508000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.508000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=a1 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.508000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.508000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=a6 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.508000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.508000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=a9 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.508000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.508000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=aa items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.508000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.508000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=ad items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.508000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.508000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=ae items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.508000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.508000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=b1 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.508000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.508000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=b2 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.508000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.508000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=b5 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.508000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.508000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=b6 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.508000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.508000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=b9 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.508000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.508000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=ba items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.508000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.508000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=bd items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.508000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.508000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=c2 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.508000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.508000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=c5 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.508000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.508000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=c6 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.508000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.508000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=c9 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.508000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.508000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=cc items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.508000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.508000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=cf items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.508000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.508000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=d0 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.508000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.508000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=d3 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.508000 audit[6001]: AVC avc: denied { bpf } for pid=6001 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.508000 audit[6001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe242465e0 a2=10 a3=d4 items=0 ppid=5965 pid=6001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.508000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:34:42.522000 audit[6002]: USER_ACCT pid=6002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:42.524656 sshd[6002]: Accepted publickey for core from 139.178.89.65 port 47200 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:34:42.525000 audit[6002]: CRED_ACQ pid=6002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:42.525000 audit[6002]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc871c2850 a2=3 a3=0 items=0 ppid=1 pid=6002 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.525000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:42.527880 sshd[6002]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:42.536389 systemd-logind[1722]: New session 16 of user core. Dec 13 14:34:42.537008 systemd[1]: Started session-16.scope. Dec 13 14:34:42.544000 audit[6002]: USER_START pid=6002 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:42.546000 audit[6005]: CRED_ACQ pid=6005 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:42.586000 audit[6011]: AVC avc: denied { bpf } for pid=6011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.586000 audit[6011]: AVC avc: denied { bpf } for pid=6011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.586000 audit[6011]: AVC avc: denied { perfmon } for pid=6011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.586000 audit[6011]: AVC avc: denied { perfmon } for pid=6011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.586000 audit[6011]: AVC avc: denied { perfmon } for pid=6011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.586000 audit[6011]: AVC avc: denied { perfmon } for pid=6011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.586000 audit[6011]: AVC avc: denied { perfmon } for pid=6011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.586000 audit[6011]: AVC avc: denied { bpf } for pid=6011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.586000 audit[6011]: AVC avc: denied { bpf } for pid=6011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.586000 audit: BPF prog-id=226 op=LOAD Dec 13 14:34:42.586000 audit[6011]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd22f593a0 a2=98 a3=1999999999999999 items=0 ppid=5965 pid=6011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.586000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:34:42.593000 audit: BPF prog-id=226 op=UNLOAD Dec 13 14:34:42.593000 audit[6011]: AVC avc: denied { bpf } for pid=6011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.593000 audit[6011]: AVC avc: denied { bpf } for pid=6011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.593000 audit[6011]: AVC avc: denied { perfmon } for pid=6011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.593000 audit[6011]: AVC avc: denied { perfmon } for pid=6011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.593000 audit[6011]: AVC avc: denied { perfmon } for pid=6011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.593000 audit[6011]: AVC avc: denied { perfmon } for pid=6011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.593000 audit[6011]: AVC avc: denied { perfmon } for pid=6011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.593000 audit[6011]: AVC avc: denied { bpf } for pid=6011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.593000 audit[6011]: AVC avc: denied { bpf } for pid=6011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.593000 audit: BPF prog-id=227 op=LOAD Dec 13 14:34:42.593000 audit[6011]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd22f59280 a2=74 a3=ffff items=0 ppid=5965 pid=6011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.593000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:34:42.595000 audit: BPF prog-id=227 op=UNLOAD Dec 13 14:34:42.595000 audit[6011]: AVC avc: denied { bpf } for pid=6011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.595000 audit[6011]: AVC avc: denied { bpf } for pid=6011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.595000 audit[6011]: AVC avc: denied { perfmon } for pid=6011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.595000 audit[6011]: AVC avc: denied { perfmon } for pid=6011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.595000 audit[6011]: AVC avc: denied { perfmon } for pid=6011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.595000 audit[6011]: AVC avc: denied { perfmon } for pid=6011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.595000 audit[6011]: AVC avc: denied { perfmon } for pid=6011 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.595000 audit[6011]: AVC avc: denied { bpf } for pid=6011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.595000 audit[6011]: AVC avc: denied { bpf } for pid=6011 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:34:42.595000 audit: BPF prog-id=228 op=LOAD Dec 13 14:34:42.595000 audit[6011]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd22f592c0 a2=40 a3=7ffd22f594a0 items=0 ppid=5965 pid=6011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.595000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:34:42.595000 audit: BPF prog-id=228 op=UNLOAD Dec 13 14:34:42.941751 sshd[6002]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:42.942000 audit[6002]: USER_END pid=6002 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:42.943000 audit[6002]: CRED_DISP pid=6002 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:42.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.19.209:22-139.178.89.65:47200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.946651 systemd[1]: sshd@15-172.31.19.209:22-139.178.89.65:47200.service: Deactivated successfully. Dec 13 14:34:42.948010 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 14:34:42.948856 systemd-logind[1722]: Session 16 logged out. Waiting for processes to exit. Dec 13 14:34:42.949969 systemd-logind[1722]: Removed session 16. Dec 13 14:34:47.970832 systemd[1]: Started sshd@16-172.31.19.209:22-139.178.89.65:47204.service. Dec 13 14:34:47.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.19.209:22-139.178.89.65:47204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:47.976395 kernel: kauditd_printk_skb: 527 callbacks suppressed Dec 13 14:34:47.976503 kernel: audit: type=1130 audit(1734100487.971:1618): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.19.209:22-139.178.89.65:47204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:48.193000 audit[6119]: USER_ACCT pid=6119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:48.200184 sshd[6119]: Accepted publickey for core from 139.178.89.65 port 47204 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:34:48.200560 kernel: audit: type=1101 audit(1734100488.193:1619): pid=6119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:48.198000 audit[6119]: CRED_ACQ pid=6119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:48.209074 kernel: audit: type=1103 audit(1734100488.198:1620): pid=6119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:48.209938 kernel: audit: type=1006 audit(1734100488.198:1621): pid=6119 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 14:34:48.210004 kernel: audit: type=1300 audit(1734100488.198:1621): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc98c01c30 a2=3 a3=0 items=0 ppid=1 pid=6119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:48.198000 audit[6119]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc98c01c30 a2=3 a3=0 items=0 ppid=1 pid=6119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:48.210312 sshd[6119]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:48.216019 kernel: audit: type=1327 audit(1734100488.198:1621): proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:48.198000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:48.223118 systemd-logind[1722]: New session 17 of user core. Dec 13 14:34:48.224496 systemd[1]: Started session-17.scope. Dec 13 14:34:48.240000 audit[6119]: USER_START pid=6119 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:48.251091 kernel: audit: type=1105 audit(1734100488.240:1622): pid=6119 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:48.251221 kernel: audit: type=1103 audit(1734100488.249:1623): pid=6128 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:48.249000 audit[6128]: CRED_ACQ pid=6128 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:48.579856 sshd[6119]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:48.580000 audit[6119]: USER_END pid=6119 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:48.584592 systemd[1]: sshd@16-172.31.19.209:22-139.178.89.65:47204.service: Deactivated successfully. Dec 13 14:34:48.585675 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 14:34:48.587206 systemd-logind[1722]: Session 17 logged out. Waiting for processes to exit. Dec 13 14:34:48.588477 kernel: audit: type=1106 audit(1734100488.580:1624): pid=6119 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:48.580000 audit[6119]: CRED_DISP pid=6119 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:48.588807 systemd-logind[1722]: Removed session 17. Dec 13 14:34:48.583000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.19.209:22-139.178.89.65:47204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:48.601396 kernel: audit: type=1104 audit(1734100488.580:1625): pid=6119 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:53.616990 systemd[1]: Started sshd@17-172.31.19.209:22-139.178.89.65:48390.service. Dec 13 14:34:53.624749 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:34:53.624915 kernel: audit: type=1130 audit(1734100493.616:1627): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.19.209:22-139.178.89.65:48390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.19.209:22-139.178.89.65:48390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:53.825000 audit[6222]: USER_ACCT pid=6222 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:53.833015 sshd[6222]: Accepted publickey for core from 139.178.89.65 port 48390 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:34:53.833387 kernel: audit: type=1101 audit(1734100493.825:1628): pid=6222 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:53.831000 audit[6222]: CRED_ACQ pid=6222 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:53.833667 sshd[6222]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:53.850909 kernel: audit: type=1103 audit(1734100493.831:1629): pid=6222 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:53.852643 kernel: audit: type=1006 audit(1734100493.831:1630): pid=6222 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 14:34:53.831000 audit[6222]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee91ff820 a2=3 a3=0 items=0 ppid=1 pid=6222 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:53.862286 kernel: audit: type=1300 audit(1734100493.831:1630): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee91ff820 a2=3 a3=0 items=0 ppid=1 pid=6222 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:53.862412 kernel: audit: type=1327 audit(1734100493.831:1630): proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:53.831000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:53.872113 systemd-logind[1722]: New session 18 of user core. Dec 13 14:34:53.873368 systemd[1]: Started session-18.scope. Dec 13 14:34:53.891000 audit[6222]: USER_START pid=6222 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:53.900000 audit[6225]: CRED_ACQ pid=6225 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:53.908695 kernel: audit: type=1105 audit(1734100493.891:1631): pid=6222 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:53.908834 kernel: audit: type=1103 audit(1734100493.900:1632): pid=6225 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:54.443635 sshd[6222]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:54.445000 audit[6222]: USER_END pid=6222 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:54.445000 audit[6222]: CRED_DISP pid=6222 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:54.458625 kernel: audit: type=1106 audit(1734100494.445:1633): pid=6222 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:54.458706 kernel: audit: type=1104 audit(1734100494.445:1634): pid=6222 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:54.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.19.209:22-139.178.89.65:48390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:54.454397 systemd[1]: sshd@17-172.31.19.209:22-139.178.89.65:48390.service: Deactivated successfully. Dec 13 14:34:54.455574 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 14:34:54.461048 systemd-logind[1722]: Session 18 logged out. Waiting for processes to exit. Dec 13 14:34:54.463720 systemd-logind[1722]: Removed session 18. Dec 13 14:34:54.477661 systemd[1]: Started sshd@18-172.31.19.209:22-139.178.89.65:48396.service. Dec 13 14:34:54.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.19.209:22-139.178.89.65:48396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:54.639000 audit[6246]: USER_ACCT pid=6246 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:54.641250 sshd[6246]: Accepted publickey for core from 139.178.89.65 port 48396 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:34:54.641000 audit[6246]: CRED_ACQ pid=6246 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:54.641000 audit[6246]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff08c53020 a2=3 a3=0 items=0 ppid=1 pid=6246 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:54.641000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:54.643508 sshd[6246]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:54.650454 systemd-logind[1722]: New session 19 of user core. Dec 13 14:34:54.651793 systemd[1]: Started session-19.scope. Dec 13 14:34:54.661000 audit[6246]: USER_START pid=6246 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:54.663000 audit[6248]: CRED_ACQ pid=6248 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:55.600515 sshd[6246]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:55.602000 audit[6246]: USER_END pid=6246 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:55.603000 audit[6246]: CRED_DISP pid=6246 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:55.608956 systemd[1]: sshd@18-172.31.19.209:22-139.178.89.65:48396.service: Deactivated successfully. Dec 13 14:34:55.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.19.209:22-139.178.89.65:48396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:55.610396 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 14:34:55.612081 systemd-logind[1722]: Session 19 logged out. Waiting for processes to exit. Dec 13 14:34:55.614386 systemd-logind[1722]: Removed session 19. Dec 13 14:34:55.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.19.209:22-139.178.89.65:48398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:55.621761 systemd[1]: Started sshd@19-172.31.19.209:22-139.178.89.65:48398.service. Dec 13 14:34:55.842000 audit[6275]: USER_ACCT pid=6275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:55.843902 sshd[6275]: Accepted publickey for core from 139.178.89.65 port 48398 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:34:55.844000 audit[6275]: CRED_ACQ pid=6275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:55.844000 audit[6275]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde3f8d5f0 a2=3 a3=0 items=0 ppid=1 pid=6275 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:55.844000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:55.846009 sshd[6275]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:55.854805 systemd[1]: Started session-20.scope. Dec 13 14:34:55.856210 systemd-logind[1722]: New session 20 of user core. Dec 13 14:34:55.863000 audit[6275]: USER_START pid=6275 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:55.865000 audit[6279]: CRED_ACQ pid=6279 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:59.138300 kernel: kauditd_printk_skb: 20 callbacks suppressed Dec 13 14:34:59.138636 kernel: audit: type=1325 audit(1734100499.132:1651): table=filter:134 family=2 entries=20 op=nft_register_rule pid=6331 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:59.132000 audit[6331]: NETFILTER_CFG table=filter:134 family=2 entries=20 op=nft_register_rule pid=6331 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:59.132000 audit[6331]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd053b9e60 a2=0 a3=7ffd053b9e4c items=0 ppid=2933 pid=6331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:59.146501 kernel: audit: type=1300 audit(1734100499.132:1651): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd053b9e60 a2=0 a3=7ffd053b9e4c items=0 ppid=2933 pid=6331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:59.149590 kernel: audit: type=1327 audit(1734100499.132:1651): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:59.132000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:59.151000 audit[6331]: NETFILTER_CFG table=nat:135 family=2 entries=22 op=nft_register_rule pid=6331 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:59.157414 kernel: audit: type=1325 audit(1734100499.151:1652): table=nat:135 family=2 entries=22 op=nft_register_rule pid=6331 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:59.151000 audit[6331]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd053b9e60 a2=0 a3=0 items=0 ppid=2933 pid=6331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:59.164539 kernel: audit: type=1300 audit(1734100499.151:1652): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd053b9e60 a2=0 a3=0 items=0 ppid=2933 pid=6331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:59.151000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:59.170438 kernel: audit: type=1327 audit(1734100499.151:1652): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:59.181000 audit[6333]: NETFILTER_CFG table=filter:136 family=2 entries=32 op=nft_register_rule pid=6333 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:59.181000 audit[6333]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe8895b000 a2=0 a3=7ffe8895afec items=0 ppid=2933 pid=6333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:59.192205 kernel: audit: type=1325 audit(1734100499.181:1653): table=filter:136 family=2 entries=32 op=nft_register_rule pid=6333 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:59.192363 kernel: audit: type=1300 audit(1734100499.181:1653): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe8895b000 a2=0 a3=7ffe8895afec items=0 ppid=2933 pid=6333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:59.181000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:59.195372 kernel: audit: type=1327 audit(1734100499.181:1653): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:59.199738 sshd[6275]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:59.197000 audit[6333]: NETFILTER_CFG table=nat:137 family=2 entries=22 op=nft_register_rule pid=6333 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:59.203380 kernel: audit: type=1325 audit(1734100499.197:1654): table=nat:137 family=2 entries=22 op=nft_register_rule pid=6333 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:34:59.197000 audit[6333]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe8895b000 a2=0 a3=0 items=0 ppid=2933 pid=6333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:59.197000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:34:59.206000 audit[6275]: USER_END pid=6275 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:59.206000 audit[6275]: CRED_DISP pid=6275 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:59.221775 systemd[1]: sshd@19-172.31.19.209:22-139.178.89.65:48398.service: Deactivated successfully. Dec 13 14:34:59.224696 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 14:34:59.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.19.209:22-139.178.89.65:48398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:59.227910 systemd-logind[1722]: Session 20 logged out. Waiting for processes to exit. Dec 13 14:34:59.233563 systemd[1]: Started sshd@20-172.31.19.209:22-139.178.89.65:40106.service. Dec 13 14:34:59.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.19.209:22-139.178.89.65:40106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:59.240613 systemd-logind[1722]: Removed session 20. Dec 13 14:34:59.420000 audit[6336]: USER_ACCT pid=6336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:59.421703 sshd[6336]: Accepted publickey for core from 139.178.89.65 port 40106 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:34:59.422000 audit[6336]: CRED_ACQ pid=6336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:59.422000 audit[6336]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa24e18a0 a2=3 a3=0 items=0 ppid=1 pid=6336 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:59.422000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:59.426607 sshd[6336]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:59.436136 systemd[1]: Started session-21.scope. Dec 13 14:34:59.436854 systemd-logind[1722]: New session 21 of user core. Dec 13 14:34:59.444000 audit[6336]: USER_START pid=6336 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:34:59.447000 audit[6338]: CRED_ACQ pid=6338 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:00.799077 sshd[6336]: pam_unix(sshd:session): session closed for user core Dec 13 14:35:00.801000 audit[6336]: USER_END pid=6336 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:00.802000 audit[6336]: CRED_DISP pid=6336 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:00.807033 systemd[1]: sshd@20-172.31.19.209:22-139.178.89.65:40106.service: Deactivated successfully. Dec 13 14:35:00.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.19.209:22-139.178.89.65:40106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:00.808709 systemd-logind[1722]: Session 21 logged out. Waiting for processes to exit. Dec 13 14:35:00.809676 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 14:35:00.810858 systemd-logind[1722]: Removed session 21. Dec 13 14:35:00.826574 systemd[1]: Started sshd@21-172.31.19.209:22-139.178.89.65:40112.service. Dec 13 14:35:00.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.19.209:22-139.178.89.65:40112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:01.049383 sshd[6364]: Accepted publickey for core from 139.178.89.65 port 40112 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:35:01.047000 audit[6364]: USER_ACCT pid=6364 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:01.071000 audit[6364]: CRED_ACQ pid=6364 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:01.071000 audit[6364]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc1f1aca0 a2=3 a3=0 items=0 ppid=1 pid=6364 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:01.071000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:01.087261 sshd[6364]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:35:01.113784 systemd[1]: Started session-22.scope. Dec 13 14:35:01.114973 systemd-logind[1722]: New session 22 of user core. Dec 13 14:35:01.194000 audit[6364]: USER_START pid=6364 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:01.200000 audit[6378]: CRED_ACQ pid=6378 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:02.229315 sshd[6364]: pam_unix(sshd:session): session closed for user core Dec 13 14:35:02.239000 audit[6364]: USER_END pid=6364 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:02.239000 audit[6364]: CRED_DISP pid=6364 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:02.244043 systemd-logind[1722]: Session 22 logged out. Waiting for processes to exit. Dec 13 14:35:02.244616 systemd[1]: sshd@21-172.31.19.209:22-139.178.89.65:40112.service: Deactivated successfully. Dec 13 14:35:02.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.19.209:22-139.178.89.65:40112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:02.245824 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 14:35:02.248391 systemd-logind[1722]: Removed session 22. Dec 13 14:35:05.412846 systemd[1]: run-containerd-runc-k8s.io-d9690d5a0b6973eaa29d42a4592cdb85f7c694dd7cdbf83a1414e1abeea6b144-runc.KITxZ9.mount: Deactivated successfully. Dec 13 14:35:05.558416 kernel: kauditd_printk_skb: 27 callbacks suppressed Dec 13 14:35:05.558807 kernel: audit: type=1400 audit(1734100505.551:1676): avc: denied { watch } for pid=2581 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:05.551000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:05.557000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:05.568525 kernel: audit: type=1400 audit(1734100505.557:1677): avc: denied { watch } for pid=2581 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:05.557000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00218df80 a2=fc6 a3=0 items=0 ppid=2415 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 key=(null) Dec 13 14:35:05.576037 kernel: audit: type=1300 audit(1734100505.557:1677): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00218df80 a2=fc6 a3=0 items=0 ppid=2415 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 key=(null) Dec 13 14:35:05.576123 kernel: audit: type=1327 audit(1734100505.557:1677): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:35:05.557000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:35:05.551000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0035a8930 a2=fc6 a3=0 items=0 ppid=2415 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 key=(null) Dec 13 14:35:05.590380 kernel: audit: type=1300 audit(1734100505.551:1676): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0035a8930 a2=fc6 a3=0 items=0 ppid=2415 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 key=(null) Dec 13 14:35:05.607408 kernel: audit: type=1327 audit(1734100505.551:1676): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:35:05.551000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:35:05.750203 env[1734]: time="2024-12-13T14:35:05.750086184Z" level=info msg="StopContainer for \"d9690d5a0b6973eaa29d42a4592cdb85f7c694dd7cdbf83a1414e1abeea6b144\" with timeout 5 (s)" Dec 13 14:35:05.751672 env[1734]: time="2024-12-13T14:35:05.751152179Z" level=info msg="Stop container \"d9690d5a0b6973eaa29d42a4592cdb85f7c694dd7cdbf83a1414e1abeea6b144\" with signal terminated" Dec 13 14:35:05.782076 systemd[1]: cri-containerd-d9690d5a0b6973eaa29d42a4592cdb85f7c694dd7cdbf83a1414e1abeea6b144.scope: Deactivated successfully. Dec 13 14:35:05.782445 systemd[1]: cri-containerd-d9690d5a0b6973eaa29d42a4592cdb85f7c694dd7cdbf83a1414e1abeea6b144.scope: Consumed 8.314s CPU time. Dec 13 14:35:05.819585 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d9690d5a0b6973eaa29d42a4592cdb85f7c694dd7cdbf83a1414e1abeea6b144-rootfs.mount: Deactivated successfully. Dec 13 14:35:05.821427 env[1734]: time="2024-12-13T14:35:05.820980497Z" level=info msg="shim disconnected" id=d9690d5a0b6973eaa29d42a4592cdb85f7c694dd7cdbf83a1414e1abeea6b144 Dec 13 14:35:05.821427 env[1734]: time="2024-12-13T14:35:05.821036635Z" level=warning msg="cleaning up after shim disconnected" id=d9690d5a0b6973eaa29d42a4592cdb85f7c694dd7cdbf83a1414e1abeea6b144 namespace=k8s.io Dec 13 14:35:05.821427 env[1734]: time="2024-12-13T14:35:05.821049826Z" level=info msg="cleaning up dead shim" Dec 13 14:35:05.832976 env[1734]: time="2024-12-13T14:35:05.832923018Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:35:05Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6491 runtime=io.containerd.runc.v2\n" Dec 13 14:35:05.856108 env[1734]: time="2024-12-13T14:35:05.855964100Z" level=info msg="StopContainer for \"d9690d5a0b6973eaa29d42a4592cdb85f7c694dd7cdbf83a1414e1abeea6b144\" returns successfully" Dec 13 14:35:05.857418 env[1734]: time="2024-12-13T14:35:05.857344690Z" level=info msg="StopPodSandbox for \"4ad48fbdfec94c0eea145232236559e847a2d5f4f3f56e87e8fb6042ffe4fdae\"" Dec 13 14:35:05.863699 env[1734]: time="2024-12-13T14:35:05.857737164Z" level=info msg="Container to stop \"d11687c2149c33240858c2301082e1122cb5e3cfd177a76bf7e6a9c2d719b94f\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:35:05.863699 env[1734]: time="2024-12-13T14:35:05.857760540Z" level=info msg="Container to stop \"d9690d5a0b6973eaa29d42a4592cdb85f7c694dd7cdbf83a1414e1abeea6b144\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:35:05.863699 env[1734]: time="2024-12-13T14:35:05.857773112Z" level=info msg="Container to stop \"8400899a08412b6749612ffbc6968aeee4f842b1f1f142e6a2493e510ca65e19\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:35:05.863490 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4ad48fbdfec94c0eea145232236559e847a2d5f4f3f56e87e8fb6042ffe4fdae-shm.mount: Deactivated successfully. Dec 13 14:35:05.872546 systemd[1]: cri-containerd-4ad48fbdfec94c0eea145232236559e847a2d5f4f3f56e87e8fb6042ffe4fdae.scope: Deactivated successfully. Dec 13 14:35:05.875922 kernel: audit: type=1334 audit(1734100505.871:1678): prog-id=122 op=UNLOAD Dec 13 14:35:05.871000 audit: BPF prog-id=122 op=UNLOAD Dec 13 14:35:05.875000 audit: BPF prog-id=125 op=UNLOAD Dec 13 14:35:05.879472 kernel: audit: type=1334 audit(1734100505.875:1679): prog-id=125 op=UNLOAD Dec 13 14:35:05.908635 env[1734]: time="2024-12-13T14:35:05.908473020Z" level=info msg="shim disconnected" id=4ad48fbdfec94c0eea145232236559e847a2d5f4f3f56e87e8fb6042ffe4fdae Dec 13 14:35:05.909014 env[1734]: time="2024-12-13T14:35:05.908988489Z" level=warning msg="cleaning up after shim disconnected" id=4ad48fbdfec94c0eea145232236559e847a2d5f4f3f56e87e8fb6042ffe4fdae namespace=k8s.io Dec 13 14:35:05.909276 env[1734]: time="2024-12-13T14:35:05.909257482Z" level=info msg="cleaning up dead shim" Dec 13 14:35:05.922455 env[1734]: time="2024-12-13T14:35:05.922413198Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:35:05Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6525 runtime=io.containerd.runc.v2\n" Dec 13 14:35:05.944793 env[1734]: time="2024-12-13T14:35:05.944685935Z" level=info msg="TearDown network for sandbox \"4ad48fbdfec94c0eea145232236559e847a2d5f4f3f56e87e8fb6042ffe4fdae\" successfully" Dec 13 14:35:05.944793 env[1734]: time="2024-12-13T14:35:05.944780274Z" level=info msg="StopPodSandbox for \"4ad48fbdfec94c0eea145232236559e847a2d5f4f3f56e87e8fb6042ffe4fdae\" returns successfully" Dec 13 14:35:06.147824 kubelet[2802]: I1213 14:35:06.147778 2802 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1c0621a5-7914-4217-8122-6cd6b43c05c8-tigera-ca-bundle\") pod \"1c0621a5-7914-4217-8122-6cd6b43c05c8\" (UID: \"1c0621a5-7914-4217-8122-6cd6b43c05c8\") " Dec 13 14:35:06.149587 kubelet[2802]: I1213 14:35:06.147870 2802 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-lib-modules\") pod \"1c0621a5-7914-4217-8122-6cd6b43c05c8\" (UID: \"1c0621a5-7914-4217-8122-6cd6b43c05c8\") " Dec 13 14:35:06.149587 kubelet[2802]: I1213 14:35:06.147896 2802 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-xtables-lock\") pod \"1c0621a5-7914-4217-8122-6cd6b43c05c8\" (UID: \"1c0621a5-7914-4217-8122-6cd6b43c05c8\") " Dec 13 14:35:06.149587 kubelet[2802]: I1213 14:35:06.147919 2802 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-cni-bin-dir\") pod \"1c0621a5-7914-4217-8122-6cd6b43c05c8\" (UID: \"1c0621a5-7914-4217-8122-6cd6b43c05c8\") " Dec 13 14:35:06.149587 kubelet[2802]: I1213 14:35:06.148000 2802 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-var-run-calico\") pod \"1c0621a5-7914-4217-8122-6cd6b43c05c8\" (UID: \"1c0621a5-7914-4217-8122-6cd6b43c05c8\") " Dec 13 14:35:06.149587 kubelet[2802]: I1213 14:35:06.148030 2802 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-cni-log-dir\") pod \"1c0621a5-7914-4217-8122-6cd6b43c05c8\" (UID: \"1c0621a5-7914-4217-8122-6cd6b43c05c8\") " Dec 13 14:35:06.149587 kubelet[2802]: I1213 14:35:06.148063 2802 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-5rrpx\" (UniqueName: \"kubernetes.io/projected/1c0621a5-7914-4217-8122-6cd6b43c05c8-kube-api-access-5rrpx\") pod \"1c0621a5-7914-4217-8122-6cd6b43c05c8\" (UID: \"1c0621a5-7914-4217-8122-6cd6b43c05c8\") " Dec 13 14:35:06.149964 kubelet[2802]: I1213 14:35:06.148086 2802 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-var-lib-calico\") pod \"1c0621a5-7914-4217-8122-6cd6b43c05c8\" (UID: \"1c0621a5-7914-4217-8122-6cd6b43c05c8\") " Dec 13 14:35:06.149964 kubelet[2802]: I1213 14:35:06.148108 2802 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-cni-net-dir\") pod \"1c0621a5-7914-4217-8122-6cd6b43c05c8\" (UID: \"1c0621a5-7914-4217-8122-6cd6b43c05c8\") " Dec 13 14:35:06.149964 kubelet[2802]: I1213 14:35:06.148138 2802 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1c0621a5-7914-4217-8122-6cd6b43c05c8-node-certs\") pod \"1c0621a5-7914-4217-8122-6cd6b43c05c8\" (UID: \"1c0621a5-7914-4217-8122-6cd6b43c05c8\") " Dec 13 14:35:06.149964 kubelet[2802]: I1213 14:35:06.148162 2802 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-flexvol-driver-host\") pod \"1c0621a5-7914-4217-8122-6cd6b43c05c8\" (UID: \"1c0621a5-7914-4217-8122-6cd6b43c05c8\") " Dec 13 14:35:06.149964 kubelet[2802]: I1213 14:35:06.148189 2802 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-policysync\") pod \"1c0621a5-7914-4217-8122-6cd6b43c05c8\" (UID: \"1c0621a5-7914-4217-8122-6cd6b43c05c8\") " Dec 13 14:35:06.166546 kubelet[2802]: I1213 14:35:06.158959 2802 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "1c0621a5-7914-4217-8122-6cd6b43c05c8" (UID: "1c0621a5-7914-4217-8122-6cd6b43c05c8"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:35:06.166546 kubelet[2802]: I1213 14:35:06.166207 2802 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "1c0621a5-7914-4217-8122-6cd6b43c05c8" (UID: "1c0621a5-7914-4217-8122-6cd6b43c05c8"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:35:06.166546 kubelet[2802]: I1213 14:35:06.166244 2802 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "1c0621a5-7914-4217-8122-6cd6b43c05c8" (UID: "1c0621a5-7914-4217-8122-6cd6b43c05c8"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:35:06.166546 kubelet[2802]: I1213 14:35:06.166264 2802 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "1c0621a5-7914-4217-8122-6cd6b43c05c8" (UID: "1c0621a5-7914-4217-8122-6cd6b43c05c8"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:35:06.166546 kubelet[2802]: I1213 14:35:06.166283 2802 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "1c0621a5-7914-4217-8122-6cd6b43c05c8" (UID: "1c0621a5-7914-4217-8122-6cd6b43c05c8"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:35:06.177413 kubelet[2802]: I1213 14:35:06.177369 2802 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "1c0621a5-7914-4217-8122-6cd6b43c05c8" (UID: "1c0621a5-7914-4217-8122-6cd6b43c05c8"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:35:06.177585 kubelet[2802]: I1213 14:35:06.177443 2802 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "1c0621a5-7914-4217-8122-6cd6b43c05c8" (UID: "1c0621a5-7914-4217-8122-6cd6b43c05c8"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:35:06.182611 kubelet[2802]: I1213 14:35:06.182131 2802 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "1c0621a5-7914-4217-8122-6cd6b43c05c8" (UID: "1c0621a5-7914-4217-8122-6cd6b43c05c8"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:35:06.182611 kubelet[2802]: I1213 14:35:06.182189 2802 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-policysync" (OuterVolumeSpecName: "policysync") pod "1c0621a5-7914-4217-8122-6cd6b43c05c8" (UID: "1c0621a5-7914-4217-8122-6cd6b43c05c8"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:35:06.196040 kubelet[2802]: I1213 14:35:06.194598 2802 topology_manager.go:215] "Topology Admit Handler" podUID="be56b3b2-c523-4e16-a7d5-fdda16947b55" podNamespace="calico-system" podName="calico-node-jj5m4" Dec 13 14:35:06.201114 kubelet[2802]: I1213 14:35:06.201068 2802 scope.go:117] "RemoveContainer" containerID="d9690d5a0b6973eaa29d42a4592cdb85f7c694dd7cdbf83a1414e1abeea6b144" Dec 13 14:35:06.201553 kubelet[2802]: E1213 14:35:06.201333 2802 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="c42d8654-1498-4287-aa04-3add6f08431a" containerName="calico-typha" Dec 13 14:35:06.201658 kubelet[2802]: E1213 14:35:06.201562 2802 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="1c0621a5-7914-4217-8122-6cd6b43c05c8" containerName="install-cni" Dec 13 14:35:06.201658 kubelet[2802]: E1213 14:35:06.201577 2802 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="1c0621a5-7914-4217-8122-6cd6b43c05c8" containerName="flexvol-driver" Dec 13 14:35:06.201658 kubelet[2802]: E1213 14:35:06.201589 2802 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="1c0621a5-7914-4217-8122-6cd6b43c05c8" containerName="calico-node" Dec 13 14:35:06.201818 kubelet[2802]: I1213 14:35:06.201658 2802 memory_manager.go:354] "RemoveStaleState removing state" podUID="c42d8654-1498-4287-aa04-3add6f08431a" containerName="calico-typha" Dec 13 14:35:06.201818 kubelet[2802]: I1213 14:35:06.201671 2802 memory_manager.go:354] "RemoveStaleState removing state" podUID="1c0621a5-7914-4217-8122-6cd6b43c05c8" containerName="calico-node" Dec 13 14:35:06.202559 kubelet[2802]: I1213 14:35:06.202510 2802 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/1c0621a5-7914-4217-8122-6cd6b43c05c8-kube-api-access-5rrpx" (OuterVolumeSpecName: "kube-api-access-5rrpx") pod "1c0621a5-7914-4217-8122-6cd6b43c05c8" (UID: "1c0621a5-7914-4217-8122-6cd6b43c05c8"). InnerVolumeSpecName "kube-api-access-5rrpx". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 14:35:06.207340 kubelet[2802]: I1213 14:35:06.207238 2802 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/1c0621a5-7914-4217-8122-6cd6b43c05c8-node-certs" (OuterVolumeSpecName: "node-certs") pod "1c0621a5-7914-4217-8122-6cd6b43c05c8" (UID: "1c0621a5-7914-4217-8122-6cd6b43c05c8"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Dec 13 14:35:06.211714 kubelet[2802]: I1213 14:35:06.211211 2802 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/1c0621a5-7914-4217-8122-6cd6b43c05c8-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "1c0621a5-7914-4217-8122-6cd6b43c05c8" (UID: "1c0621a5-7914-4217-8122-6cd6b43c05c8"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 14:35:06.213601 env[1734]: time="2024-12-13T14:35:06.213549911Z" level=info msg="RemoveContainer for \"d9690d5a0b6973eaa29d42a4592cdb85f7c694dd7cdbf83a1414e1abeea6b144\"" Dec 13 14:35:06.220979 env[1734]: time="2024-12-13T14:35:06.220933532Z" level=info msg="RemoveContainer for \"d9690d5a0b6973eaa29d42a4592cdb85f7c694dd7cdbf83a1414e1abeea6b144\" returns successfully" Dec 13 14:35:06.223327 kubelet[2802]: I1213 14:35:06.223294 2802 scope.go:117] "RemoveContainer" containerID="8400899a08412b6749612ffbc6968aeee4f842b1f1f142e6a2493e510ca65e19" Dec 13 14:35:06.230769 env[1734]: time="2024-12-13T14:35:06.230398146Z" level=info msg="RemoveContainer for \"8400899a08412b6749612ffbc6968aeee4f842b1f1f142e6a2493e510ca65e19\"" Dec 13 14:35:06.236419 env[1734]: time="2024-12-13T14:35:06.236324727Z" level=info msg="RemoveContainer for \"8400899a08412b6749612ffbc6968aeee4f842b1f1f142e6a2493e510ca65e19\" returns successfully" Dec 13 14:35:06.236501 systemd[1]: Created slice kubepods-besteffort-podbe56b3b2_c523_4e16_a7d5_fdda16947b55.slice. Dec 13 14:35:06.237828 kubelet[2802]: I1213 14:35:06.237795 2802 scope.go:117] "RemoveContainer" containerID="d11687c2149c33240858c2301082e1122cb5e3cfd177a76bf7e6a9c2d719b94f" Dec 13 14:35:06.248925 kubelet[2802]: I1213 14:35:06.248885 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/be56b3b2-c523-4e16-a7d5-fdda16947b55-cni-net-dir\") pod \"calico-node-jj5m4\" (UID: \"be56b3b2-c523-4e16-a7d5-fdda16947b55\") " pod="calico-system/calico-node-jj5m4" Dec 13 14:35:06.249458 kubelet[2802]: I1213 14:35:06.249430 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/be56b3b2-c523-4e16-a7d5-fdda16947b55-var-lib-calico\") pod \"calico-node-jj5m4\" (UID: \"be56b3b2-c523-4e16-a7d5-fdda16947b55\") " pod="calico-system/calico-node-jj5m4" Dec 13 14:35:06.249838 kubelet[2802]: I1213 14:35:06.249816 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/be56b3b2-c523-4e16-a7d5-fdda16947b55-flexvol-driver-host\") pod \"calico-node-jj5m4\" (UID: \"be56b3b2-c523-4e16-a7d5-fdda16947b55\") " pod="calico-system/calico-node-jj5m4" Dec 13 14:35:06.249971 kubelet[2802]: I1213 14:35:06.249956 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/be56b3b2-c523-4e16-a7d5-fdda16947b55-lib-modules\") pod \"calico-node-jj5m4\" (UID: \"be56b3b2-c523-4e16-a7d5-fdda16947b55\") " pod="calico-system/calico-node-jj5m4" Dec 13 14:35:06.250071 kubelet[2802]: I1213 14:35:06.250058 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/be56b3b2-c523-4e16-a7d5-fdda16947b55-cni-log-dir\") pod \"calico-node-jj5m4\" (UID: \"be56b3b2-c523-4e16-a7d5-fdda16947b55\") " pod="calico-system/calico-node-jj5m4" Dec 13 14:35:06.250161 kubelet[2802]: I1213 14:35:06.250148 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/be56b3b2-c523-4e16-a7d5-fdda16947b55-tigera-ca-bundle\") pod \"calico-node-jj5m4\" (UID: \"be56b3b2-c523-4e16-a7d5-fdda16947b55\") " pod="calico-system/calico-node-jj5m4" Dec 13 14:35:06.250302 kubelet[2802]: I1213 14:35:06.250287 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/be56b3b2-c523-4e16-a7d5-fdda16947b55-var-run-calico\") pod \"calico-node-jj5m4\" (UID: \"be56b3b2-c523-4e16-a7d5-fdda16947b55\") " pod="calico-system/calico-node-jj5m4" Dec 13 14:35:06.250441 kubelet[2802]: I1213 14:35:06.250425 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9dgvn\" (UniqueName: \"kubernetes.io/projected/be56b3b2-c523-4e16-a7d5-fdda16947b55-kube-api-access-9dgvn\") pod \"calico-node-jj5m4\" (UID: \"be56b3b2-c523-4e16-a7d5-fdda16947b55\") " pod="calico-system/calico-node-jj5m4" Dec 13 14:35:06.250541 kubelet[2802]: I1213 14:35:06.250529 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/be56b3b2-c523-4e16-a7d5-fdda16947b55-policysync\") pod \"calico-node-jj5m4\" (UID: \"be56b3b2-c523-4e16-a7d5-fdda16947b55\") " pod="calico-system/calico-node-jj5m4" Dec 13 14:35:06.250632 kubelet[2802]: I1213 14:35:06.250617 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/be56b3b2-c523-4e16-a7d5-fdda16947b55-cni-bin-dir\") pod \"calico-node-jj5m4\" (UID: \"be56b3b2-c523-4e16-a7d5-fdda16947b55\") " pod="calico-system/calico-node-jj5m4" Dec 13 14:35:06.250722 kubelet[2802]: I1213 14:35:06.250710 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/be56b3b2-c523-4e16-a7d5-fdda16947b55-xtables-lock\") pod \"calico-node-jj5m4\" (UID: \"be56b3b2-c523-4e16-a7d5-fdda16947b55\") " pod="calico-system/calico-node-jj5m4" Dec 13 14:35:06.253133 kubelet[2802]: I1213 14:35:06.253102 2802 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/be56b3b2-c523-4e16-a7d5-fdda16947b55-node-certs\") pod \"calico-node-jj5m4\" (UID: \"be56b3b2-c523-4e16-a7d5-fdda16947b55\") " pod="calico-system/calico-node-jj5m4" Dec 13 14:35:06.253314 kubelet[2802]: I1213 14:35:06.253300 2802 reconciler_common.go:289] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-var-run-calico\") on node \"ip-172-31-19-209\" DevicePath \"\"" Dec 13 14:35:06.253521 kubelet[2802]: I1213 14:35:06.253507 2802 reconciler_common.go:289] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-xtables-lock\") on node \"ip-172-31-19-209\" DevicePath \"\"" Dec 13 14:35:06.253621 kubelet[2802]: I1213 14:35:06.253596 2802 reconciler_common.go:289] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-cni-bin-dir\") on node \"ip-172-31-19-209\" DevicePath \"\"" Dec 13 14:35:06.253704 kubelet[2802]: I1213 14:35:06.253694 2802 reconciler_common.go:289] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-var-lib-calico\") on node \"ip-172-31-19-209\" DevicePath \"\"" Dec 13 14:35:06.253886 kubelet[2802]: I1213 14:35:06.253871 2802 reconciler_common.go:289] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-cni-net-dir\") on node \"ip-172-31-19-209\" DevicePath \"\"" Dec 13 14:35:06.253974 kubelet[2802]: I1213 14:35:06.253965 2802 reconciler_common.go:289] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-cni-log-dir\") on node \"ip-172-31-19-209\" DevicePath \"\"" Dec 13 14:35:06.255132 kubelet[2802]: I1213 14:35:06.254044 2802 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-5rrpx\" (UniqueName: \"kubernetes.io/projected/1c0621a5-7914-4217-8122-6cd6b43c05c8-kube-api-access-5rrpx\") on node \"ip-172-31-19-209\" DevicePath \"\"" Dec 13 14:35:06.255132 kubelet[2802]: I1213 14:35:06.254060 2802 reconciler_common.go:289] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1c0621a5-7914-4217-8122-6cd6b43c05c8-node-certs\") on node \"ip-172-31-19-209\" DevicePath \"\"" Dec 13 14:35:06.255132 kubelet[2802]: I1213 14:35:06.254076 2802 reconciler_common.go:289] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-flexvol-driver-host\") on node \"ip-172-31-19-209\" DevicePath \"\"" Dec 13 14:35:06.255132 kubelet[2802]: I1213 14:35:06.254089 2802 reconciler_common.go:289] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-policysync\") on node \"ip-172-31-19-209\" DevicePath \"\"" Dec 13 14:35:06.255132 kubelet[2802]: I1213 14:35:06.254103 2802 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1c0621a5-7914-4217-8122-6cd6b43c05c8-tigera-ca-bundle\") on node \"ip-172-31-19-209\" DevicePath \"\"" Dec 13 14:35:06.255132 kubelet[2802]: I1213 14:35:06.254116 2802 reconciler_common.go:289] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1c0621a5-7914-4217-8122-6cd6b43c05c8-lib-modules\") on node \"ip-172-31-19-209\" DevicePath \"\"" Dec 13 14:35:06.261187 env[1734]: time="2024-12-13T14:35:06.260591930Z" level=info msg="RemoveContainer for \"d11687c2149c33240858c2301082e1122cb5e3cfd177a76bf7e6a9c2d719b94f\"" Dec 13 14:35:06.270493 env[1734]: time="2024-12-13T14:35:06.270446626Z" level=info msg="RemoveContainer for \"d11687c2149c33240858c2301082e1122cb5e3cfd177a76bf7e6a9c2d719b94f\" returns successfully" Dec 13 14:35:06.271558 kubelet[2802]: I1213 14:35:06.271533 2802 scope.go:117] "RemoveContainer" containerID="d9690d5a0b6973eaa29d42a4592cdb85f7c694dd7cdbf83a1414e1abeea6b144" Dec 13 14:35:06.272416 env[1734]: time="2024-12-13T14:35:06.272327406Z" level=error msg="ContainerStatus for \"d9690d5a0b6973eaa29d42a4592cdb85f7c694dd7cdbf83a1414e1abeea6b144\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"d9690d5a0b6973eaa29d42a4592cdb85f7c694dd7cdbf83a1414e1abeea6b144\": not found" Dec 13 14:35:06.275292 kubelet[2802]: E1213 14:35:06.274993 2802 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"d9690d5a0b6973eaa29d42a4592cdb85f7c694dd7cdbf83a1414e1abeea6b144\": not found" containerID="d9690d5a0b6973eaa29d42a4592cdb85f7c694dd7cdbf83a1414e1abeea6b144" Dec 13 14:35:06.275292 kubelet[2802]: I1213 14:35:06.275037 2802 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"d9690d5a0b6973eaa29d42a4592cdb85f7c694dd7cdbf83a1414e1abeea6b144"} err="failed to get container status \"d9690d5a0b6973eaa29d42a4592cdb85f7c694dd7cdbf83a1414e1abeea6b144\": rpc error: code = NotFound desc = an error occurred when try to find container \"d9690d5a0b6973eaa29d42a4592cdb85f7c694dd7cdbf83a1414e1abeea6b144\": not found" Dec 13 14:35:06.275292 kubelet[2802]: I1213 14:35:06.275065 2802 scope.go:117] "RemoveContainer" containerID="8400899a08412b6749612ffbc6968aeee4f842b1f1f142e6a2493e510ca65e19" Dec 13 14:35:06.276037 env[1734]: time="2024-12-13T14:35:06.275931923Z" level=error msg="ContainerStatus for \"8400899a08412b6749612ffbc6968aeee4f842b1f1f142e6a2493e510ca65e19\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"8400899a08412b6749612ffbc6968aeee4f842b1f1f142e6a2493e510ca65e19\": not found" Dec 13 14:35:06.280135 kubelet[2802]: E1213 14:35:06.280098 2802 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"8400899a08412b6749612ffbc6968aeee4f842b1f1f142e6a2493e510ca65e19\": not found" containerID="8400899a08412b6749612ffbc6968aeee4f842b1f1f142e6a2493e510ca65e19" Dec 13 14:35:06.280521 kubelet[2802]: I1213 14:35:06.280472 2802 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"8400899a08412b6749612ffbc6968aeee4f842b1f1f142e6a2493e510ca65e19"} err="failed to get container status \"8400899a08412b6749612ffbc6968aeee4f842b1f1f142e6a2493e510ca65e19\": rpc error: code = NotFound desc = an error occurred when try to find container \"8400899a08412b6749612ffbc6968aeee4f842b1f1f142e6a2493e510ca65e19\": not found" Dec 13 14:35:06.283699 kubelet[2802]: I1213 14:35:06.280686 2802 scope.go:117] "RemoveContainer" containerID="d11687c2149c33240858c2301082e1122cb5e3cfd177a76bf7e6a9c2d719b94f" Dec 13 14:35:06.283699 kubelet[2802]: E1213 14:35:06.282516 2802 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"d11687c2149c33240858c2301082e1122cb5e3cfd177a76bf7e6a9c2d719b94f\": not found" containerID="d11687c2149c33240858c2301082e1122cb5e3cfd177a76bf7e6a9c2d719b94f" Dec 13 14:35:06.283699 kubelet[2802]: I1213 14:35:06.282549 2802 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"d11687c2149c33240858c2301082e1122cb5e3cfd177a76bf7e6a9c2d719b94f"} err="failed to get container status \"d11687c2149c33240858c2301082e1122cb5e3cfd177a76bf7e6a9c2d719b94f\": rpc error: code = NotFound desc = an error occurred when try to find container \"d11687c2149c33240858c2301082e1122cb5e3cfd177a76bf7e6a9c2d719b94f\": not found" Dec 13 14:35:06.283864 env[1734]: time="2024-12-13T14:35:06.281867041Z" level=error msg="ContainerStatus for \"d11687c2149c33240858c2301082e1122cb5e3cfd177a76bf7e6a9c2d719b94f\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"d11687c2149c33240858c2301082e1122cb5e3cfd177a76bf7e6a9c2d719b94f\": not found" Dec 13 14:35:06.389782 systemd[1]: var-lib-kubelet-pods-1c0621a5\x2d7914\x2d4217\x2d8122\x2d6cd6b43c05c8-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. Dec 13 14:35:06.389924 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4ad48fbdfec94c0eea145232236559e847a2d5f4f3f56e87e8fb6042ffe4fdae-rootfs.mount: Deactivated successfully. Dec 13 14:35:06.390007 systemd[1]: var-lib-kubelet-pods-1c0621a5\x2d7914\x2d4217\x2d8122\x2d6cd6b43c05c8-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d5rrpx.mount: Deactivated successfully. Dec 13 14:35:06.390099 systemd[1]: var-lib-kubelet-pods-1c0621a5\x2d7914\x2d4217\x2d8122\x2d6cd6b43c05c8-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Dec 13 14:35:06.439000 audit[2574]: AVC avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:06.439000 audit[2574]: AVC avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:06.451497 kernel: audit: type=1400 audit(1734100506.439:1680): avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:06.451786 kernel: audit: type=1400 audit(1734100506.439:1681): avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:06.439000 audit[2574]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=50 a1=c00ef87170 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:35:06.439000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:35:06.439000 audit[2574]: AVC avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:06.439000 audit[2574]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=50 a1=c00ef871a0 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:35:06.439000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:35:06.439000 audit[2574]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00f1efda0 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:35:06.439000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:35:06.444000 audit[2574]: AVC avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:06.444000 audit[2574]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=50 a1=c0106156a0 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:35:06.444000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:35:06.461000 audit[2574]: AVC avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:06.461000 audit[2574]: AVC avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:06.461000 audit[2574]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=50 a1=c010615880 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:35:06.461000 audit[2574]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00ef872c0 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:35:06.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:35:06.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:35:06.492259 systemd[1]: Removed slice kubepods-besteffort-pod1c0621a5_7914_4217_8122_6cd6b43c05c8.slice. Dec 13 14:35:06.492434 systemd[1]: kubepods-besteffort-pod1c0621a5_7914_4217_8122_6cd6b43c05c8.slice: Consumed 8.951s CPU time. Dec 13 14:35:06.561333 env[1734]: time="2024-12-13T14:35:06.561285567Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jj5m4,Uid:be56b3b2-c523-4e16-a7d5-fdda16947b55,Namespace:calico-system,Attempt:0,}" Dec 13 14:35:06.590798 env[1734]: time="2024-12-13T14:35:06.590699426Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:35:06.590798 env[1734]: time="2024-12-13T14:35:06.590760995Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:35:06.590798 env[1734]: time="2024-12-13T14:35:06.590777826Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:35:06.591483 env[1734]: time="2024-12-13T14:35:06.591319404Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cf263675b1bd22c410718d4a9f0c3c4d14afd49399dfa3661e4a98a0317cfd02 pid=6569 runtime=io.containerd.runc.v2 Dec 13 14:35:06.635624 systemd[1]: Started cri-containerd-cf263675b1bd22c410718d4a9f0c3c4d14afd49399dfa3661e4a98a0317cfd02.scope. Dec 13 14:35:06.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.652000 audit: BPF prog-id=229 op=LOAD Dec 13 14:35:06.653000 audit[6578]: AVC avc: denied { bpf } for pid=6578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.653000 audit[6578]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=6569 pid=6578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:06.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366323633363735623162643232633431303731386434613966306333 Dec 13 14:35:06.653000 audit[6578]: AVC avc: denied { perfmon } for pid=6578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.653000 audit[6578]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=6569 pid=6578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:06.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366323633363735623162643232633431303731386434613966306333 Dec 13 14:35:06.653000 audit[6578]: AVC avc: denied { bpf } for pid=6578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.653000 audit[6578]: AVC avc: denied { bpf } for pid=6578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.653000 audit[6578]: AVC avc: denied { bpf } for pid=6578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.653000 audit[6578]: AVC avc: denied { perfmon } for pid=6578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.653000 audit[6578]: AVC avc: denied { perfmon } for pid=6578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.653000 audit[6578]: AVC avc: denied { perfmon } for pid=6578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.653000 audit[6578]: AVC avc: denied { perfmon } for pid=6578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.653000 audit[6578]: AVC avc: denied { perfmon } for pid=6578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.653000 audit[6578]: AVC avc: denied { bpf } for pid=6578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.653000 audit[6578]: AVC avc: denied { bpf } for pid=6578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.653000 audit: BPF prog-id=230 op=LOAD Dec 13 14:35:06.653000 audit[6578]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003006b0 items=0 ppid=6569 pid=6578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:06.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366323633363735623162643232633431303731386434613966306333 Dec 13 14:35:06.654000 audit[6578]: AVC avc: denied { bpf } for pid=6578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.654000 audit[6578]: AVC avc: denied { bpf } for pid=6578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.654000 audit[6578]: AVC avc: denied { perfmon } for pid=6578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.654000 audit[6578]: AVC avc: denied { perfmon } for pid=6578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.654000 audit[6578]: AVC avc: denied { perfmon } for pid=6578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.654000 audit[6578]: AVC avc: denied { perfmon } for pid=6578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.654000 audit[6578]: AVC avc: denied { perfmon } for pid=6578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.654000 audit[6578]: AVC avc: denied { bpf } for pid=6578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.654000 audit[6578]: AVC avc: denied { bpf } for pid=6578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.654000 audit: BPF prog-id=231 op=LOAD Dec 13 14:35:06.654000 audit[6578]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003006f8 items=0 ppid=6569 pid=6578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:06.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366323633363735623162643232633431303731386434613966306333 Dec 13 14:35:06.654000 audit: BPF prog-id=231 op=UNLOAD Dec 13 14:35:06.654000 audit: BPF prog-id=230 op=UNLOAD Dec 13 14:35:06.654000 audit[6578]: AVC avc: denied { bpf } for pid=6578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.654000 audit[6578]: AVC avc: denied { bpf } for pid=6578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.654000 audit[6578]: AVC avc: denied { bpf } for pid=6578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.654000 audit[6578]: AVC avc: denied { perfmon } for pid=6578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.654000 audit[6578]: AVC avc: denied { perfmon } for pid=6578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.654000 audit[6578]: AVC avc: denied { perfmon } for pid=6578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.654000 audit[6578]: AVC avc: denied { perfmon } for pid=6578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.654000 audit[6578]: AVC avc: denied { perfmon } for pid=6578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.654000 audit[6578]: AVC avc: denied { bpf } for pid=6578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.654000 audit[6578]: AVC avc: denied { bpf } for pid=6578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.654000 audit: BPF prog-id=232 op=LOAD Dec 13 14:35:06.654000 audit[6578]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000300b08 items=0 ppid=6569 pid=6578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:06.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366323633363735623162643232633431303731386434613966306333 Dec 13 14:35:06.679078 env[1734]: time="2024-12-13T14:35:06.678943056Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jj5m4,Uid:be56b3b2-c523-4e16-a7d5-fdda16947b55,Namespace:calico-system,Attempt:0,} returns sandbox id \"cf263675b1bd22c410718d4a9f0c3c4d14afd49399dfa3661e4a98a0317cfd02\"" Dec 13 14:35:06.685271 env[1734]: time="2024-12-13T14:35:06.685228486Z" level=info msg="CreateContainer within sandbox \"cf263675b1bd22c410718d4a9f0c3c4d14afd49399dfa3661e4a98a0317cfd02\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:35:06.724891 env[1734]: time="2024-12-13T14:35:06.723621226Z" level=info msg="CreateContainer within sandbox \"cf263675b1bd22c410718d4a9f0c3c4d14afd49399dfa3661e4a98a0317cfd02\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"29d10174634979b15936a3cbb2081940356713b1760b291ebb1fd5c60ad5ebc6\"" Dec 13 14:35:06.725369 env[1734]: time="2024-12-13T14:35:06.725319216Z" level=info msg="StartContainer for \"29d10174634979b15936a3cbb2081940356713b1760b291ebb1fd5c60ad5ebc6\"" Dec 13 14:35:06.761039 systemd[1]: Started cri-containerd-29d10174634979b15936a3cbb2081940356713b1760b291ebb1fd5c60ad5ebc6.scope. Dec 13 14:35:06.806000 audit[6611]: AVC avc: denied { perfmon } for pid=6611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.806000 audit[6611]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f09447b7458 items=0 ppid=6569 pid=6611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:06.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239643130313734363334393739623135393336613363626232303831 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { bpf } for pid=6611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { bpf } for pid=6611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { bpf } for pid=6611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { perfmon } for pid=6611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { perfmon } for pid=6611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { perfmon } for pid=6611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { perfmon } for pid=6611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { perfmon } for pid=6611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { bpf } for pid=6611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { bpf } for pid=6611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit: BPF prog-id=233 op=LOAD Dec 13 14:35:06.807000 audit[6611]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c000323208 items=0 ppid=6569 pid=6611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:06.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239643130313734363334393739623135393336613363626232303831 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { bpf } for pid=6611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { bpf } for pid=6611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { perfmon } for pid=6611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { perfmon } for pid=6611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { perfmon } for pid=6611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { perfmon } for pid=6611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { perfmon } for pid=6611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { bpf } for pid=6611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { bpf } for pid=6611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit: BPF prog-id=234 op=LOAD Dec 13 14:35:06.807000 audit[6611]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c000323258 items=0 ppid=6569 pid=6611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:06.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239643130313734363334393739623135393336613363626232303831 Dec 13 14:35:06.807000 audit: BPF prog-id=234 op=UNLOAD Dec 13 14:35:06.807000 audit: BPF prog-id=233 op=UNLOAD Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { bpf } for pid=6611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { bpf } for pid=6611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { bpf } for pid=6611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { perfmon } for pid=6611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { perfmon } for pid=6611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { perfmon } for pid=6611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { perfmon } for pid=6611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { perfmon } for pid=6611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { bpf } for pid=6611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit[6611]: AVC avc: denied { bpf } for pid=6611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:06.807000 audit: BPF prog-id=235 op=LOAD Dec 13 14:35:06.807000 audit[6611]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c0003232e8 items=0 ppid=6569 pid=6611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:06.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239643130313734363334393739623135393336613363626232303831 Dec 13 14:35:06.833992 env[1734]: time="2024-12-13T14:35:06.833946149Z" level=info msg="StartContainer for \"29d10174634979b15936a3cbb2081940356713b1760b291ebb1fd5c60ad5ebc6\" returns successfully" Dec 13 14:35:06.952031 systemd[1]: cri-containerd-29d10174634979b15936a3cbb2081940356713b1760b291ebb1fd5c60ad5ebc6.scope: Deactivated successfully. Dec 13 14:35:06.955000 audit: BPF prog-id=235 op=UNLOAD Dec 13 14:35:07.020866 env[1734]: time="2024-12-13T14:35:07.020589025Z" level=info msg="shim disconnected" id=29d10174634979b15936a3cbb2081940356713b1760b291ebb1fd5c60ad5ebc6 Dec 13 14:35:07.020866 env[1734]: time="2024-12-13T14:35:07.020764348Z" level=warning msg="cleaning up after shim disconnected" id=29d10174634979b15936a3cbb2081940356713b1760b291ebb1fd5c60ad5ebc6 namespace=k8s.io Dec 13 14:35:07.020866 env[1734]: time="2024-12-13T14:35:07.020778564Z" level=info msg="cleaning up dead shim" Dec 13 14:35:07.032799 env[1734]: time="2024-12-13T14:35:07.032745388Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:35:07Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6649 runtime=io.containerd.runc.v2\n" Dec 13 14:35:07.158275 env[1734]: time="2024-12-13T14:35:07.158200995Z" level=info msg="CreateContainer within sandbox \"cf263675b1bd22c410718d4a9f0c3c4d14afd49399dfa3661e4a98a0317cfd02\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:35:07.208566 env[1734]: time="2024-12-13T14:35:07.208508428Z" level=info msg="CreateContainer within sandbox \"cf263675b1bd22c410718d4a9f0c3c4d14afd49399dfa3661e4a98a0317cfd02\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"d81c5e72ca52922a75ab85e05fc750cce186f86890a477c168a96588037e157e\"" Dec 13 14:35:07.209530 env[1734]: time="2024-12-13T14:35:07.209495206Z" level=info msg="StartContainer for \"d81c5e72ca52922a75ab85e05fc750cce186f86890a477c168a96588037e157e\"" Dec 13 14:35:07.244428 systemd[1]: Started cri-containerd-d81c5e72ca52922a75ab85e05fc750cce186f86890a477c168a96588037e157e.scope. Dec 13 14:35:07.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.19.209:22-139.178.89.65:40118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:07.271531 systemd[1]: Started sshd@22-172.31.19.209:22-139.178.89.65:40118.service. Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { perfmon } for pid=6673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit[6673]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1f6c464a68 items=0 ppid=6569 pid=6673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:07.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438316335653732636135323932326137356162383565303566633735 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { bpf } for pid=6673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { bpf } for pid=6673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { bpf } for pid=6673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { perfmon } for pid=6673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { perfmon } for pid=6673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { perfmon } for pid=6673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { perfmon } for pid=6673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { perfmon } for pid=6673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { bpf } for pid=6673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { bpf } for pid=6673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit: BPF prog-id=236 op=LOAD Dec 13 14:35:07.306000 audit[6673]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003e0268 items=0 ppid=6569 pid=6673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:07.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438316335653732636135323932326137356162383565303566633735 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { bpf } for pid=6673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { bpf } for pid=6673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { perfmon } for pid=6673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { perfmon } for pid=6673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { perfmon } for pid=6673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { perfmon } for pid=6673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { perfmon } for pid=6673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { bpf } for pid=6673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { bpf } for pid=6673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit: BPF prog-id=237 op=LOAD Dec 13 14:35:07.306000 audit[6673]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003e02b8 items=0 ppid=6569 pid=6673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:07.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438316335653732636135323932326137356162383565303566633735 Dec 13 14:35:07.306000 audit: BPF prog-id=237 op=UNLOAD Dec 13 14:35:07.306000 audit: BPF prog-id=236 op=UNLOAD Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { bpf } for pid=6673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { bpf } for pid=6673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { bpf } for pid=6673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { perfmon } for pid=6673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { perfmon } for pid=6673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { perfmon } for pid=6673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { perfmon } for pid=6673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { perfmon } for pid=6673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { bpf } for pid=6673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit[6673]: AVC avc: denied { bpf } for pid=6673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:07.306000 audit: BPF prog-id=238 op=LOAD Dec 13 14:35:07.306000 audit[6673]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003e0348 items=0 ppid=6569 pid=6673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:07.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438316335653732636135323932326137356162383565303566633735 Dec 13 14:35:07.350800 env[1734]: time="2024-12-13T14:35:07.350688026Z" level=info msg="StartContainer for \"d81c5e72ca52922a75ab85e05fc750cce186f86890a477c168a96588037e157e\" returns successfully" Dec 13 14:35:07.382924 systemd[1]: run-containerd-runc-k8s.io-cf263675b1bd22c410718d4a9f0c3c4d14afd49399dfa3661e4a98a0317cfd02-runc.1RbYNw.mount: Deactivated successfully. Dec 13 14:35:07.490000 audit[6685]: USER_ACCT pid=6685 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:07.492470 sshd[6685]: Accepted publickey for core from 139.178.89.65 port 40118 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:35:07.492000 audit[6685]: CRED_ACQ pid=6685 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:07.492000 audit[6685]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5c71cee0 a2=3 a3=0 items=0 ppid=1 pid=6685 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:07.492000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:07.495467 sshd[6685]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:35:07.501193 systemd-logind[1722]: New session 23 of user core. Dec 13 14:35:07.502231 systemd[1]: Started session-23.scope. Dec 13 14:35:07.513000 audit[6685]: USER_START pid=6685 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:07.516000 audit[6705]: CRED_ACQ pid=6705 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:07.789412 sshd[6685]: pam_unix(sshd:session): session closed for user core Dec 13 14:35:07.790000 audit[6685]: USER_END pid=6685 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:07.791000 audit[6685]: CRED_DISP pid=6685 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:07.796053 systemd[1]: sshd@22-172.31.19.209:22-139.178.89.65:40118.service: Deactivated successfully. Dec 13 14:35:07.797186 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 14:35:07.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.19.209:22-139.178.89.65:40118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:07.797891 systemd-logind[1722]: Session 23 logged out. Waiting for processes to exit. Dec 13 14:35:07.800146 systemd-logind[1722]: Removed session 23. Dec 13 14:35:07.941628 kubelet[2802]: I1213 14:35:07.941591 2802 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="1c0621a5-7914-4217-8122-6cd6b43c05c8" path="/var/lib/kubelet/pods/1c0621a5-7914-4217-8122-6cd6b43c05c8/volumes" Dec 13 14:35:09.876857 env[1734]: time="2024-12-13T14:35:09.875093972Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: failed to load CNI config list file /etc/cni/net.d/10-calico.conflist: error parsing configuration list: unexpected end of JSON input: invalid cni config: failed to load cni config" Dec 13 14:35:09.885804 systemd[1]: cri-containerd-d81c5e72ca52922a75ab85e05fc750cce186f86890a477c168a96588037e157e.scope: Deactivated successfully. Dec 13 14:35:09.886222 systemd[1]: cri-containerd-d81c5e72ca52922a75ab85e05fc750cce186f86890a477c168a96588037e157e.scope: Consumed 1.029s CPU time. Dec 13 14:35:09.889000 audit: BPF prog-id=238 op=UNLOAD Dec 13 14:35:09.952697 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d81c5e72ca52922a75ab85e05fc750cce186f86890a477c168a96588037e157e-rootfs.mount: Deactivated successfully. Dec 13 14:35:09.983241 env[1734]: time="2024-12-13T14:35:09.983185126Z" level=info msg="shim disconnected" id=d81c5e72ca52922a75ab85e05fc750cce186f86890a477c168a96588037e157e Dec 13 14:35:09.983241 env[1734]: time="2024-12-13T14:35:09.983241644Z" level=warning msg="cleaning up after shim disconnected" id=d81c5e72ca52922a75ab85e05fc750cce186f86890a477c168a96588037e157e namespace=k8s.io Dec 13 14:35:09.983686 env[1734]: time="2024-12-13T14:35:09.983253781Z" level=info msg="cleaning up dead shim" Dec 13 14:35:09.993832 env[1734]: time="2024-12-13T14:35:09.993787236Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:35:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6727 runtime=io.containerd.runc.v2\n" Dec 13 14:35:10.452000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:10.452000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023f5000 a2=fc6 a3=0 items=0 ppid=2415 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 key=(null) Dec 13 14:35:10.452000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:35:10.453000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:10.453000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00249daa0 a2=fc6 a3=0 items=0 ppid=2415 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 key=(null) Dec 13 14:35:10.453000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:35:10.454000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:10.454000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023f5020 a2=fc6 a3=0 items=0 ppid=2415 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 key=(null) Dec 13 14:35:10.454000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:35:10.480000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:10.480000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023f51c0 a2=fc6 a3=0 items=0 ppid=2415 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 key=(null) Dec 13 14:35:10.480000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:35:10.559082 env[1734]: time="2024-12-13T14:35:10.559034469Z" level=info msg="CreateContainer within sandbox \"cf263675b1bd22c410718d4a9f0c3c4d14afd49399dfa3661e4a98a0317cfd02\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:35:10.595440 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2832107666.mount: Deactivated successfully. Dec 13 14:35:10.598181 env[1734]: time="2024-12-13T14:35:10.598119640Z" level=info msg="CreateContainer within sandbox \"cf263675b1bd22c410718d4a9f0c3c4d14afd49399dfa3661e4a98a0317cfd02\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"6921b63dfd65640c38964a69c478d0168ef4a91224fbd5f1c4d4832d3a09af93\"" Dec 13 14:35:10.603130 env[1734]: time="2024-12-13T14:35:10.603086093Z" level=info msg="StartContainer for \"6921b63dfd65640c38964a69c478d0168ef4a91224fbd5f1c4d4832d3a09af93\"" Dec 13 14:35:10.646996 systemd[1]: Started cri-containerd-6921b63dfd65640c38964a69c478d0168ef4a91224fbd5f1c4d4832d3a09af93.scope. Dec 13 14:35:10.732072 kernel: kauditd_printk_skb: 184 callbacks suppressed Dec 13 14:35:10.746327 kernel: audit: type=1400 audit(1734100510.725:1731): avc: denied { perfmon } for pid=6748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.747100 kernel: audit: type=1300 audit(1734100510.725:1731): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=7fe63851e718 items=0 ppid=6569 pid=6748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:10.747310 kernel: audit: type=1327 audit(1734100510.725:1731): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639323162363364666436353634306333383936346136396334373864 Dec 13 14:35:10.725000 audit[6748]: AVC avc: denied { perfmon } for pid=6748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.725000 audit[6748]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=7fe63851e718 items=0 ppid=6569 pid=6748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:10.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639323162363364666436353634306333383936346136396334373864 Dec 13 14:35:10.725000 audit[6748]: AVC avc: denied { bpf } for pid=6748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.761462 kernel: audit: type=1400 audit(1734100510.725:1732): avc: denied { bpf } for pid=6748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.766403 kernel: audit: type=1400 audit(1734100510.725:1732): avc: denied { bpf } for pid=6748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.770811 kernel: audit: type=1400 audit(1734100510.725:1732): avc: denied { bpf } for pid=6748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.725000 audit[6748]: AVC avc: denied { bpf } for pid=6748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.725000 audit[6748]: AVC avc: denied { bpf } for pid=6748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.725000 audit[6748]: AVC avc: denied { perfmon } for pid=6748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.775231 kernel: audit: type=1400 audit(1734100510.725:1732): avc: denied { perfmon } for pid=6748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.725000 audit[6748]: AVC avc: denied { perfmon } for pid=6748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.780519 kernel: audit: type=1400 audit(1734100510.725:1732): avc: denied { perfmon } for pid=6748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.725000 audit[6748]: AVC avc: denied { perfmon } for pid=6748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.785430 kernel: audit: type=1400 audit(1734100510.725:1732): avc: denied { perfmon } for pid=6748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.789303 kernel: audit: type=1400 audit(1734100510.725:1732): avc: denied { perfmon } for pid=6748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.725000 audit[6748]: AVC avc: denied { perfmon } for pid=6748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.791223 env[1734]: time="2024-12-13T14:35:10.791169299Z" level=info msg="StartContainer for \"6921b63dfd65640c38964a69c478d0168ef4a91224fbd5f1c4d4832d3a09af93\" returns successfully" Dec 13 14:35:10.725000 audit[6748]: AVC avc: denied { perfmon } for pid=6748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.725000 audit[6748]: AVC avc: denied { bpf } for pid=6748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.725000 audit[6748]: AVC avc: denied { bpf } for pid=6748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.725000 audit: BPF prog-id=239 op=LOAD Dec 13 14:35:10.725000 audit[6748]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014f9d8 a2=78 a3=c00028a6e8 items=0 ppid=6569 pid=6748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:10.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639323162363364666436353634306333383936346136396334373864 Dec 13 14:35:10.727000 audit[6748]: AVC avc: denied { bpf } for pid=6748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.727000 audit[6748]: AVC avc: denied { bpf } for pid=6748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.727000 audit[6748]: AVC avc: denied { perfmon } for pid=6748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.727000 audit[6748]: AVC avc: denied { perfmon } for pid=6748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.727000 audit[6748]: AVC avc: denied { perfmon } for pid=6748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.727000 audit[6748]: AVC avc: denied { perfmon } for pid=6748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.727000 audit[6748]: AVC avc: denied { perfmon } for pid=6748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.727000 audit[6748]: AVC avc: denied { bpf } for pid=6748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.727000 audit[6748]: AVC avc: denied { bpf } for pid=6748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.727000 audit: BPF prog-id=240 op=LOAD Dec 13 14:35:10.727000 audit[6748]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014f770 a2=78 a3=c00028a738 items=0 ppid=6569 pid=6748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:10.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639323162363364666436353634306333383936346136396334373864 Dec 13 14:35:10.731000 audit: BPF prog-id=240 op=UNLOAD Dec 13 14:35:10.731000 audit: BPF prog-id=239 op=UNLOAD Dec 13 14:35:10.731000 audit[6748]: AVC avc: denied { bpf } for pid=6748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.731000 audit[6748]: AVC avc: denied { bpf } for pid=6748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.731000 audit[6748]: AVC avc: denied { bpf } for pid=6748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.731000 audit[6748]: AVC avc: denied { perfmon } for pid=6748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.731000 audit[6748]: AVC avc: denied { perfmon } for pid=6748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.731000 audit[6748]: AVC avc: denied { perfmon } for pid=6748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.731000 audit[6748]: AVC avc: denied { perfmon } for pid=6748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.731000 audit[6748]: AVC avc: denied { perfmon } for pid=6748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.731000 audit[6748]: AVC avc: denied { bpf } for pid=6748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.731000 audit[6748]: AVC avc: denied { bpf } for pid=6748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:10.731000 audit: BPF prog-id=241 op=LOAD Dec 13 14:35:10.731000 audit[6748]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014fc30 a2=78 a3=c00028a7c8 items=0 ppid=6569 pid=6748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:10.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639323162363364666436353634306333383936346136396334373864 Dec 13 14:35:10.755000 audit[6765]: NETFILTER_CFG table=filter:138 family=2 entries=20 op=nft_register_rule pid=6765 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:10.755000 audit[6765]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc6d8631c0 a2=0 a3=7ffc6d8631ac items=0 ppid=2933 pid=6765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:10.755000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:10.769000 audit[6765]: NETFILTER_CFG table=nat:139 family=2 entries=106 op=nft_register_chain pid=6765 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:10.769000 audit[6765]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffc6d8631c0 a2=0 a3=7ffc6d8631ac items=0 ppid=2933 pid=6765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:10.769000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:11.055000 audit[4924]: AVC avc: denied { watch } for pid=4924 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_33_45.763121275/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c579,c662 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c579,c662 tclass=file permissive=0 Dec 13 14:35:11.055000 audit[4924]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f33600 a2=fc6 a3=0 items=0 ppid=4498 pid=4924 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c579,c662 key=(null) Dec 13 14:35:11.055000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:35:11.590908 systemd[1]: run-containerd-runc-k8s.io-6921b63dfd65640c38964a69c478d0168ef4a91224fbd5f1c4d4832d3a09af93-runc.fLhtQo.mount: Deactivated successfully. Dec 13 14:35:12.504881 systemd[1]: run-containerd-runc-k8s.io-6921b63dfd65640c38964a69c478d0168ef4a91224fbd5f1c4d4832d3a09af93-runc.pLbPl0.mount: Deactivated successfully. Dec 13 14:35:12.757000 audit[4969]: AVC avc: denied { watch } for pid=4969 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_33_45.2624344173/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c206,c834 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c206,c834 tclass=file permissive=0 Dec 13 14:35:12.757000 audit[4969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00004fb80 a2=fc6 a3=0 items=0 ppid=4682 pid=4969 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c206,c834 key=(null) Dec 13 14:35:12.757000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:35:12.827067 systemd[1]: Started sshd@23-172.31.19.209:22-139.178.89.65:51202.service. Dec 13 14:35:12.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.19.209:22-139.178.89.65:51202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:12.961000 audit[6876]: AVC avc: denied { write } for pid=6876 comm="tee" name="fd" dev="proc" ino=38101 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:35:12.961000 audit[6876]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd3a29aa22 a2=241 a3=1b6 items=1 ppid=6853 pid=6876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:12.961000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:35:12.961000 audit: PATH item=0 name="/dev/fd/63" inode=36955 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:12.961000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:35:13.014000 audit[6907]: AVC avc: denied { write } for pid=6907 comm="tee" name="fd" dev="proc" ino=36989 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:35:13.014000 audit[6907]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdc18cba20 a2=241 a3=1b6 items=1 ppid=6863 pid=6907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:13.014000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:35:13.014000 audit: PATH item=0 name="/dev/fd/63" inode=36986 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:13.014000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:35:13.024000 audit[6904]: AVC avc: denied { write } for pid=6904 comm="tee" name="fd" dev="proc" ino=36993 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:35:13.024000 audit[6904]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe548b5a20 a2=241 a3=1b6 items=1 ppid=6859 pid=6904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:13.024000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:35:13.024000 audit: PATH item=0 name="/dev/fd/63" inode=38109 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:13.024000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:35:13.057000 audit[6915]: AVC avc: denied { write } for pid=6915 comm="tee" name="fd" dev="proc" ino=37000 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:35:13.057000 audit[6915]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffd3b28a21 a2=241 a3=1b6 items=1 ppid=6864 pid=6915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:13.057000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:35:13.057000 audit: PATH item=0 name="/dev/fd/63" inode=38120 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:13.057000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:35:13.066000 audit[6918]: AVC avc: denied { write } for pid=6918 comm="tee" name="fd" dev="proc" ino=37006 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:35:13.066000 audit[6918]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdfc51fa20 a2=241 a3=1b6 items=1 ppid=6855 pid=6918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:13.066000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:35:13.066000 audit: PATH item=0 name="/dev/fd/63" inode=38121 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:13.066000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:35:13.107000 audit[6844]: USER_ACCT pid=6844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:13.111726 sshd[6844]: Accepted publickey for core from 139.178.89.65 port 51202 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:35:13.118000 audit[6844]: CRED_ACQ pid=6844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:13.118000 audit[6844]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb5a826f0 a2=3 a3=0 items=0 ppid=1 pid=6844 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:13.118000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:13.122000 audit[6912]: AVC avc: denied { write } for pid=6912 comm="tee" name="fd" dev="proc" ino=37019 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:35:13.122000 audit[6912]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc502c2a11 a2=241 a3=1b6 items=1 ppid=6865 pid=6912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:13.122000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:35:13.122000 audit: PATH item=0 name="/dev/fd/63" inode=36997 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:13.122000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:35:13.123565 sshd[6844]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:35:13.139815 systemd-logind[1722]: New session 24 of user core. Dec 13 14:35:13.141030 systemd[1]: Started session-24.scope. Dec 13 14:35:13.144000 audit[6925]: AVC avc: denied { write } for pid=6925 comm="tee" name="fd" dev="proc" ino=38144 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:35:13.144000 audit[6925]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe790aca10 a2=241 a3=1b6 items=1 ppid=6860 pid=6925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:13.144000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:35:13.144000 audit: PATH item=0 name="/dev/fd/63" inode=37009 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:35:13.144000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:35:13.150000 audit[6844]: USER_START pid=6844 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:13.153000 audit[6932]: CRED_ACQ pid=6932 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:13.872000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:13.872000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:13.872000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:13.872000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:13.872000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:13.872000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:13.872000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:13.872000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:13.872000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:13.872000 audit: BPF prog-id=242 op=LOAD Dec 13 14:35:13.872000 audit[6973]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd9ea2ed0 a2=98 a3=3 items=0 ppid=6856 pid=6973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:13.872000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:35:13.873000 audit: BPF prog-id=242 op=UNLOAD Dec 13 14:35:13.875000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:13.875000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:13.875000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:13.875000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:13.875000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:13.875000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:13.875000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:13.875000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:13.875000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:13.875000 audit: BPF prog-id=243 op=LOAD Dec 13 14:35:13.875000 audit[6973]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcd9ea2cb0 a2=74 a3=540051 items=0 ppid=6856 pid=6973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:13.875000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:35:13.875000 audit: BPF prog-id=243 op=UNLOAD Dec 13 14:35:13.875000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:13.875000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:13.875000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:13.875000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:13.875000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:13.875000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:13.875000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:13.875000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:13.875000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:13.875000 audit: BPF prog-id=244 op=LOAD Dec 13 14:35:13.875000 audit[6973]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcd9ea2ce0 a2=94 a3=2 items=0 ppid=6856 pid=6973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:13.875000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:35:13.876000 audit: BPF prog-id=244 op=UNLOAD Dec 13 14:35:14.070000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.070000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.070000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.070000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.070000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.070000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.070000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.070000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.070000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.070000 audit: BPF prog-id=245 op=LOAD Dec 13 14:35:14.070000 audit[6973]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcd9ea2ba0 a2=40 a3=1 items=0 ppid=6856 pid=6973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.070000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:35:14.070000 audit: BPF prog-id=245 op=UNLOAD Dec 13 14:35:14.070000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.070000 audit[6973]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcd9ea2c70 a2=50 a3=7ffcd9ea2d50 items=0 ppid=6856 pid=6973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.070000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:35:14.086000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.086000 audit[6973]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd9ea2bb0 a2=28 a3=0 items=0 ppid=6856 pid=6973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.086000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:35:14.086000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.086000 audit[6973]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd9ea2be0 a2=28 a3=0 items=0 ppid=6856 pid=6973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.086000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:35:14.086000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.086000 audit[6973]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd9ea2af0 a2=28 a3=0 items=0 ppid=6856 pid=6973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.086000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:35:14.086000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.086000 audit[6973]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd9ea2c00 a2=28 a3=0 items=0 ppid=6856 pid=6973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.086000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:35:14.086000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.086000 audit[6973]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd9ea2be0 a2=28 a3=0 items=0 ppid=6856 pid=6973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.086000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:35:14.086000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.086000 audit[6973]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd9ea2bd0 a2=28 a3=0 items=0 ppid=6856 pid=6973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.086000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:35:14.086000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.086000 audit[6973]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd9ea2c00 a2=28 a3=0 items=0 ppid=6856 pid=6973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.086000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:35:14.086000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.086000 audit[6973]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd9ea2be0 a2=28 a3=0 items=0 ppid=6856 pid=6973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.086000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:35:14.086000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.086000 audit[6973]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd9ea2c00 a2=28 a3=0 items=0 ppid=6856 pid=6973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.086000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:35:14.086000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.086000 audit[6973]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd9ea2bd0 a2=28 a3=0 items=0 ppid=6856 pid=6973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.086000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:35:14.086000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.086000 audit[6973]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcd9ea2c40 a2=28 a3=0 items=0 ppid=6856 pid=6973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.086000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcd9ea29f0 a2=50 a3=1 items=0 ppid=6856 pid=6973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.087000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit: BPF prog-id=246 op=LOAD Dec 13 14:35:14.087000 audit[6973]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcd9ea29f0 a2=94 a3=5 items=0 ppid=6856 pid=6973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.087000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:35:14.087000 audit: BPF prog-id=246 op=UNLOAD Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcd9ea2aa0 a2=50 a3=1 items=0 ppid=6856 pid=6973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.087000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcd9ea2bc0 a2=4 a3=38 items=0 ppid=6856 pid=6973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.087000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { confidentiality } for pid=6973 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:14.087000 audit[6973]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcd9ea2c10 a2=94 a3=6 items=0 ppid=6856 pid=6973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.087000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { confidentiality } for pid=6973 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:14.087000 audit[6973]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcd9ea23c0 a2=94 a3=83 items=0 ppid=6856 pid=6973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.087000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { perfmon } for pid=6973 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { bpf } for pid=6973 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.087000 audit[6973]: AVC avc: denied { confidentiality } for pid=6973 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:14.087000 audit[6973]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcd9ea23c0 a2=94 a3=83 items=0 ppid=6856 pid=6973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.087000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:35:14.147000 audit[6979]: AVC avc: denied { bpf } for pid=6979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.147000 audit[6979]: AVC avc: denied { bpf } for pid=6979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.147000 audit[6979]: AVC avc: denied { perfmon } for pid=6979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.147000 audit[6979]: AVC avc: denied { perfmon } for pid=6979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.147000 audit[6979]: AVC avc: denied { perfmon } for pid=6979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.147000 audit[6979]: AVC avc: denied { perfmon } for pid=6979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.147000 audit[6979]: AVC avc: denied { perfmon } for pid=6979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.147000 audit[6979]: AVC avc: denied { bpf } for pid=6979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.147000 audit[6979]: AVC avc: denied { bpf } for pid=6979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.147000 audit: BPF prog-id=247 op=LOAD Dec 13 14:35:14.147000 audit[6979]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec7d236c0 a2=98 a3=1999999999999999 items=0 ppid=6856 pid=6979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.147000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:35:14.147000 audit: BPF prog-id=247 op=UNLOAD Dec 13 14:35:14.147000 audit[6979]: AVC avc: denied { bpf } for pid=6979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.147000 audit[6979]: AVC avc: denied { bpf } for pid=6979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.147000 audit[6979]: AVC avc: denied { perfmon } for pid=6979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.147000 audit[6979]: AVC avc: denied { perfmon } for pid=6979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.147000 audit[6979]: AVC avc: denied { perfmon } for pid=6979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.147000 audit[6979]: AVC avc: denied { perfmon } for pid=6979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.147000 audit[6979]: AVC avc: denied { perfmon } for pid=6979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.147000 audit[6979]: AVC avc: denied { bpf } for pid=6979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.147000 audit[6979]: AVC avc: denied { bpf } for pid=6979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.147000 audit: BPF prog-id=248 op=LOAD Dec 13 14:35:14.147000 audit[6979]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec7d235a0 a2=74 a3=ffff items=0 ppid=6856 pid=6979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.147000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:35:14.147000 audit: BPF prog-id=248 op=UNLOAD Dec 13 14:35:14.147000 audit[6979]: AVC avc: denied { bpf } for pid=6979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.147000 audit[6979]: AVC avc: denied { bpf } for pid=6979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.147000 audit[6979]: AVC avc: denied { perfmon } for pid=6979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.147000 audit[6979]: AVC avc: denied { perfmon } for pid=6979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.147000 audit[6979]: AVC avc: denied { perfmon } for pid=6979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.147000 audit[6979]: AVC avc: denied { perfmon } for pid=6979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.147000 audit[6979]: AVC avc: denied { perfmon } for pid=6979 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.147000 audit[6979]: AVC avc: denied { bpf } for pid=6979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.147000 audit[6979]: AVC avc: denied { bpf } for pid=6979 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.147000 audit: BPF prog-id=249 op=LOAD Dec 13 14:35:14.147000 audit[6979]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec7d235e0 a2=40 a3=7ffec7d237c0 items=0 ppid=6856 pid=6979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.147000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:35:14.147000 audit: BPF prog-id=249 op=UNLOAD Dec 13 14:35:14.250876 sshd[6844]: pam_unix(sshd:session): session closed for user core Dec 13 14:35:14.254000 audit[6844]: USER_END pid=6844 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:14.255000 audit[6844]: CRED_DISP pid=6844 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:14.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.19.209:22-139.178.89.65:51202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:14.269345 systemd[1]: sshd@23-172.31.19.209:22-139.178.89.65:51202.service: Deactivated successfully. Dec 13 14:35:14.270530 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 14:35:14.272558 systemd-logind[1722]: Session 24 logged out. Waiting for processes to exit. Dec 13 14:35:14.275176 systemd-logind[1722]: Removed session 24. Dec 13 14:35:14.337000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.337000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.337000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.337000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.337000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.337000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.337000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.337000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.337000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.337000 audit: BPF prog-id=250 op=LOAD Dec 13 14:35:14.337000 audit[7003]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd8c481e0 a2=98 a3=ffffffff items=0 ppid=6856 pid=7003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.337000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:35:14.337000 audit: BPF prog-id=250 op=UNLOAD Dec 13 14:35:14.339000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.339000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.339000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.339000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.339000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.339000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.339000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.339000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.339000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.339000 audit: BPF prog-id=251 op=LOAD Dec 13 14:35:14.339000 audit[7003]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd8c47ff0 a2=74 a3=540051 items=0 ppid=6856 pid=7003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.339000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:35:14.339000 audit: BPF prog-id=251 op=UNLOAD Dec 13 14:35:14.339000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.339000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.339000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.339000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.339000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.339000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.339000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.339000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.339000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.339000 audit: BPF prog-id=252 op=LOAD Dec 13 14:35:14.339000 audit[7003]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd8c48020 a2=94 a3=2 items=0 ppid=6856 pid=7003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.339000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:35:14.343000 audit: BPF prog-id=252 op=UNLOAD Dec 13 14:35:14.343000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.343000 audit[7003]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcd8c47ef0 a2=28 a3=0 items=0 ppid=6856 pid=7003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.343000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:35:14.345000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.345000 audit[7003]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd8c47f20 a2=28 a3=0 items=0 ppid=6856 pid=7003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.345000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:35:14.345000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.345000 audit[7003]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd8c47e30 a2=28 a3=0 items=0 ppid=6856 pid=7003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.345000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:35:14.345000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.345000 audit[7003]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcd8c47f40 a2=28 a3=0 items=0 ppid=6856 pid=7003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.345000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:35:14.345000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.345000 audit[7003]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcd8c47f20 a2=28 a3=0 items=0 ppid=6856 pid=7003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.345000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:35:14.345000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.345000 audit[7003]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcd8c47f10 a2=28 a3=0 items=0 ppid=6856 pid=7003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.345000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:35:14.345000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.345000 audit[7003]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcd8c47f40 a2=28 a3=0 items=0 ppid=6856 pid=7003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.345000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:35:14.345000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.345000 audit[7003]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd8c47f20 a2=28 a3=0 items=0 ppid=6856 pid=7003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.345000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:35:14.345000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.345000 audit[7003]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd8c47f40 a2=28 a3=0 items=0 ppid=6856 pid=7003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.345000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:35:14.345000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.345000 audit[7003]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd8c47f10 a2=28 a3=0 items=0 ppid=6856 pid=7003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.345000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:35:14.345000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.345000 audit[7003]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcd8c47f80 a2=28 a3=0 items=0 ppid=6856 pid=7003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.345000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:35:14.345000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.345000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.345000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.345000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.345000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.345000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.345000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.345000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.345000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.345000 audit: BPF prog-id=253 op=LOAD Dec 13 14:35:14.345000 audit[7003]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcd8c47df0 a2=40 a3=0 items=0 ppid=6856 pid=7003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.345000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:35:14.345000 audit: BPF prog-id=253 op=UNLOAD Dec 13 14:35:14.347000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.347000 audit[7003]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffcd8c47de0 a2=50 a3=2800 items=0 ppid=6856 pid=7003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.347000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:35:14.347000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.347000 audit[7003]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffcd8c47de0 a2=50 a3=2800 items=0 ppid=6856 pid=7003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.347000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:35:14.347000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.347000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.347000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.347000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.347000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.347000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.347000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.347000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.347000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.347000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.347000 audit: BPF prog-id=254 op=LOAD Dec 13 14:35:14.347000 audit[7003]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcd8c47600 a2=94 a3=2 items=0 ppid=6856 pid=7003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.347000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:35:14.347000 audit: BPF prog-id=254 op=UNLOAD Dec 13 14:35:14.347000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.347000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.347000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.347000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.347000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.347000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.347000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.347000 audit[7003]: AVC avc: denied { perfmon } for pid=7003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.347000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.347000 audit[7003]: AVC avc: denied { bpf } for pid=7003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.347000 audit: BPF prog-id=255 op=LOAD Dec 13 14:35:14.347000 audit[7003]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcd8c47700 a2=94 a3=2d items=0 ppid=6856 pid=7003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.347000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:35:14.360000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.360000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.360000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.360000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.360000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.360000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.360000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.360000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.360000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.360000 audit: BPF prog-id=256 op=LOAD Dec 13 14:35:14.360000 audit[7007]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffff7f0280 a2=98 a3=0 items=0 ppid=6856 pid=7007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.360000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:35:14.360000 audit: BPF prog-id=256 op=UNLOAD Dec 13 14:35:14.360000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.360000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.360000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.360000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.360000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.360000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.360000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.360000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.360000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.360000 audit: BPF prog-id=257 op=LOAD Dec 13 14:35:14.360000 audit[7007]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffff7f0060 a2=74 a3=540051 items=0 ppid=6856 pid=7007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.360000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:35:14.360000 audit: BPF prog-id=257 op=UNLOAD Dec 13 14:35:14.360000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.360000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.360000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.360000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.360000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.360000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.360000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.360000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.360000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.360000 audit: BPF prog-id=258 op=LOAD Dec 13 14:35:14.360000 audit[7007]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffff7f0090 a2=94 a3=2 items=0 ppid=6856 pid=7007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.360000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:35:14.361000 audit: BPF prog-id=258 op=UNLOAD Dec 13 14:35:14.361826 (udev-worker)[7006]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:35:14.361826 (udev-worker)[7005]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:35:14.522528 kubelet[2802]: I1213 14:35:14.522415 2802 scope.go:117] "RemoveContainer" containerID="6cca2d83872ba6d6708d498f7b766570f5e382bacd4f4c6d9b069ba54061298d" Dec 13 14:35:14.531683 env[1734]: time="2024-12-13T14:35:14.531637188Z" level=info msg="RemoveContainer for \"6cca2d83872ba6d6708d498f7b766570f5e382bacd4f4c6d9b069ba54061298d\"" Dec 13 14:35:14.538831 env[1734]: time="2024-12-13T14:35:14.538772356Z" level=info msg="RemoveContainer for \"6cca2d83872ba6d6708d498f7b766570f5e382bacd4f4c6d9b069ba54061298d\" returns successfully" Dec 13 14:35:14.545408 env[1734]: time="2024-12-13T14:35:14.544394163Z" level=info msg="StopPodSandbox for \"136af3ff9b47286354bc2ff4b3a5eff73d95718e1856bbf3f260d78fa5a7ee4a\"" Dec 13 14:35:14.545408 env[1734]: time="2024-12-13T14:35:14.544536212Z" level=info msg="TearDown network for sandbox \"136af3ff9b47286354bc2ff4b3a5eff73d95718e1856bbf3f260d78fa5a7ee4a\" successfully" Dec 13 14:35:14.545408 env[1734]: time="2024-12-13T14:35:14.544581519Z" level=info msg="StopPodSandbox for \"136af3ff9b47286354bc2ff4b3a5eff73d95718e1856bbf3f260d78fa5a7ee4a\" returns successfully" Dec 13 14:35:14.548211 env[1734]: time="2024-12-13T14:35:14.546973625Z" level=info msg="RemovePodSandbox for \"136af3ff9b47286354bc2ff4b3a5eff73d95718e1856bbf3f260d78fa5a7ee4a\"" Dec 13 14:35:14.548211 env[1734]: time="2024-12-13T14:35:14.547017110Z" level=info msg="Forcibly stopping sandbox \"136af3ff9b47286354bc2ff4b3a5eff73d95718e1856bbf3f260d78fa5a7ee4a\"" Dec 13 14:35:14.548211 env[1734]: time="2024-12-13T14:35:14.547157052Z" level=info msg="TearDown network for sandbox \"136af3ff9b47286354bc2ff4b3a5eff73d95718e1856bbf3f260d78fa5a7ee4a\" successfully" Dec 13 14:35:14.556072 env[1734]: time="2024-12-13T14:35:14.556023160Z" level=info msg="RemovePodSandbox \"136af3ff9b47286354bc2ff4b3a5eff73d95718e1856bbf3f260d78fa5a7ee4a\" returns successfully" Dec 13 14:35:14.556850 env[1734]: time="2024-12-13T14:35:14.556821328Z" level=info msg="StopPodSandbox for \"c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50\"" Dec 13 14:35:14.570000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.570000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.570000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.570000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.570000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.570000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.570000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.570000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.570000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.570000 audit: BPF prog-id=259 op=LOAD Dec 13 14:35:14.570000 audit[7007]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffff7eff50 a2=40 a3=1 items=0 ppid=6856 pid=7007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.570000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:35:14.571000 audit: BPF prog-id=259 op=UNLOAD Dec 13 14:35:14.571000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.571000 audit[7007]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffff7f0020 a2=50 a3=7fffff7f0100 items=0 ppid=6856 pid=7007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.571000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:35:14.585000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.585000 audit[7007]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffff7eff60 a2=28 a3=0 items=0 ppid=6856 pid=7007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.585000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:35:14.585000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.585000 audit[7007]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffff7eff90 a2=28 a3=0 items=0 ppid=6856 pid=7007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.585000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:35:14.585000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.585000 audit[7007]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffff7efea0 a2=28 a3=0 items=0 ppid=6856 pid=7007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.585000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:35:14.585000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.585000 audit[7007]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffff7effb0 a2=28 a3=0 items=0 ppid=6856 pid=7007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.585000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:35:14.585000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.585000 audit[7007]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffff7eff90 a2=28 a3=0 items=0 ppid=6856 pid=7007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.585000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:35:14.585000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.585000 audit[7007]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffff7eff80 a2=28 a3=0 items=0 ppid=6856 pid=7007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.585000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:35:14.585000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.585000 audit[7007]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffff7effb0 a2=28 a3=0 items=0 ppid=6856 pid=7007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.585000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:35:14.585000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.585000 audit[7007]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffff7eff90 a2=28 a3=0 items=0 ppid=6856 pid=7007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.585000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:35:14.586000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.586000 audit[7007]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffff7effb0 a2=28 a3=0 items=0 ppid=6856 pid=7007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.586000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:35:14.586000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.586000 audit[7007]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffff7eff80 a2=28 a3=0 items=0 ppid=6856 pid=7007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.586000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:35:14.586000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.586000 audit[7007]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffff7efff0 a2=28 a3=0 items=0 ppid=6856 pid=7007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.586000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:35:14.586000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.586000 audit[7007]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffff7efda0 a2=50 a3=1 items=0 ppid=6856 pid=7007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.586000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:35:14.586000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.586000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.586000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.586000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.586000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.586000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.586000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.586000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.586000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.586000 audit: BPF prog-id=260 op=LOAD Dec 13 14:35:14.586000 audit[7007]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffff7efda0 a2=94 a3=5 items=0 ppid=6856 pid=7007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.586000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:35:14.586000 audit: BPF prog-id=260 op=UNLOAD Dec 13 14:35:14.586000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.586000 audit[7007]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffff7efe50 a2=50 a3=1 items=0 ppid=6856 pid=7007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.586000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:35:14.586000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.586000 audit[7007]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffff7eff70 a2=4 a3=38 items=0 ppid=6856 pid=7007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.586000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:35:14.586000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.586000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.586000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.586000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.586000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.586000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.586000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.586000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.586000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.586000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.586000 audit[7007]: AVC avc: denied { confidentiality } for pid=7007 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:14.586000 audit[7007]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffff7effc0 a2=94 a3=6 items=0 ppid=6856 pid=7007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.586000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:35:14.587000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.587000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.587000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.587000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.587000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.587000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.587000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.587000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.587000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.587000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.587000 audit[7007]: AVC avc: denied { confidentiality } for pid=7007 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:14.587000 audit[7007]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffff7ef770 a2=94 a3=83 items=0 ppid=6856 pid=7007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.587000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:35:14.587000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.587000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.587000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.587000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.587000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.587000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.587000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.587000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.587000 audit[7007]: AVC avc: denied { perfmon } for pid=7007 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.587000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.587000 audit[7007]: AVC avc: denied { confidentiality } for pid=7007 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:35:14.587000 audit[7007]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffff7ef770 a2=94 a3=83 items=0 ppid=6856 pid=7007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.587000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:35:14.588000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.588000 audit[7007]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffff7f11b0 a2=10 a3=f1f00800 items=0 ppid=6856 pid=7007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.588000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:35:14.588000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.588000 audit[7007]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffff7f1050 a2=10 a3=3 items=0 ppid=6856 pid=7007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.588000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:35:14.588000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.588000 audit[7007]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffff7f0ff0 a2=10 a3=3 items=0 ppid=6856 pid=7007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.588000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:35:14.588000 audit[7007]: AVC avc: denied { bpf } for pid=7007 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:14.588000 audit[7007]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffff7f0ff0 a2=10 a3=7 items=0 ppid=6856 pid=7007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:14.588000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:35:14.596000 audit: BPF prog-id=255 op=UNLOAD Dec 13 14:35:15.449267 env[1734]: 2024-12-13 14:35:15.025 [WARNING][7039] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" Dec 13 14:35:15.449267 env[1734]: 2024-12-13 14:35:15.031 [INFO][7039] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Dec 13 14:35:15.449267 env[1734]: 2024-12-13 14:35:15.032 [INFO][7039] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" iface="eth0" netns="" Dec 13 14:35:15.449267 env[1734]: 2024-12-13 14:35:15.032 [INFO][7039] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Dec 13 14:35:15.449267 env[1734]: 2024-12-13 14:35:15.032 [INFO][7039] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Dec 13 14:35:15.449267 env[1734]: 2024-12-13 14:35:15.389 [INFO][7064] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" HandleID="k8s-pod-network.c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Workload="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" Dec 13 14:35:15.449267 env[1734]: 2024-12-13 14:35:15.394 [INFO][7064] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:35:15.449267 env[1734]: 2024-12-13 14:35:15.395 [INFO][7064] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:35:15.449267 env[1734]: 2024-12-13 14:35:15.416 [WARNING][7064] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" HandleID="k8s-pod-network.c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Workload="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" Dec 13 14:35:15.449267 env[1734]: 2024-12-13 14:35:15.416 [INFO][7064] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" HandleID="k8s-pod-network.c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Workload="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" Dec 13 14:35:15.449267 env[1734]: 2024-12-13 14:35:15.422 [INFO][7064] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:35:15.449267 env[1734]: 2024-12-13 14:35:15.439 [INFO][7039] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Dec 13 14:35:15.451482 env[1734]: time="2024-12-13T14:35:15.449295791Z" level=info msg="TearDown network for sandbox \"c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50\" successfully" Dec 13 14:35:15.451482 env[1734]: time="2024-12-13T14:35:15.449333525Z" level=info msg="StopPodSandbox for \"c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50\" returns successfully" Dec 13 14:35:15.451482 env[1734]: time="2024-12-13T14:35:15.450577390Z" level=info msg="RemovePodSandbox for \"c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50\"" Dec 13 14:35:15.451482 env[1734]: time="2024-12-13T14:35:15.450613920Z" level=info msg="Forcibly stopping sandbox \"c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50\"" Dec 13 14:35:15.613050 env[1734]: 2024-12-13 14:35:15.514 [WARNING][7082] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" WorkloadEndpoint="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" Dec 13 14:35:15.613050 env[1734]: 2024-12-13 14:35:15.514 [INFO][7082] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Dec 13 14:35:15.613050 env[1734]: 2024-12-13 14:35:15.514 [INFO][7082] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" iface="eth0" netns="" Dec 13 14:35:15.613050 env[1734]: 2024-12-13 14:35:15.514 [INFO][7082] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Dec 13 14:35:15.613050 env[1734]: 2024-12-13 14:35:15.514 [INFO][7082] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Dec 13 14:35:15.613050 env[1734]: 2024-12-13 14:35:15.582 [INFO][7088] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" HandleID="k8s-pod-network.c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Workload="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" Dec 13 14:35:15.613050 env[1734]: 2024-12-13 14:35:15.583 [INFO][7088] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:35:15.613050 env[1734]: 2024-12-13 14:35:15.583 [INFO][7088] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:35:15.613050 env[1734]: 2024-12-13 14:35:15.602 [WARNING][7088] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" HandleID="k8s-pod-network.c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Workload="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" Dec 13 14:35:15.613050 env[1734]: 2024-12-13 14:35:15.603 [INFO][7088] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" HandleID="k8s-pod-network.c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Workload="ip--172--31--19--209-k8s-calico--kube--controllers--888c7f5dd--6vnlq-eth0" Dec 13 14:35:15.613050 env[1734]: 2024-12-13 14:35:15.606 [INFO][7088] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:35:15.613050 env[1734]: 2024-12-13 14:35:15.609 [INFO][7082] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50" Dec 13 14:35:15.617026 env[1734]: time="2024-12-13T14:35:15.613098161Z" level=info msg="TearDown network for sandbox \"c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50\" successfully" Dec 13 14:35:15.622142 env[1734]: time="2024-12-13T14:35:15.622080490Z" level=info msg="RemovePodSandbox \"c859fac43ebcedc859f98128459a7d31fb0b058a94f85ff70fac8a7790e8cd50\" returns successfully" Dec 13 14:35:15.622844 env[1734]: time="2024-12-13T14:35:15.622812935Z" level=info msg="StopPodSandbox for \"4ad48fbdfec94c0eea145232236559e847a2d5f4f3f56e87e8fb6042ffe4fdae\"" Dec 13 14:35:15.623526 env[1734]: time="2024-12-13T14:35:15.623315265Z" level=info msg="TearDown network for sandbox \"4ad48fbdfec94c0eea145232236559e847a2d5f4f3f56e87e8fb6042ffe4fdae\" successfully" Dec 13 14:35:15.623685 env[1734]: time="2024-12-13T14:35:15.623521121Z" level=info msg="StopPodSandbox for \"4ad48fbdfec94c0eea145232236559e847a2d5f4f3f56e87e8fb6042ffe4fdae\" returns successfully" Dec 13 14:35:15.624381 env[1734]: time="2024-12-13T14:35:15.624332369Z" level=info msg="RemovePodSandbox for \"4ad48fbdfec94c0eea145232236559e847a2d5f4f3f56e87e8fb6042ffe4fdae\"" Dec 13 14:35:15.624471 env[1734]: time="2024-12-13T14:35:15.624387161Z" level=info msg="Forcibly stopping sandbox \"4ad48fbdfec94c0eea145232236559e847a2d5f4f3f56e87e8fb6042ffe4fdae\"" Dec 13 14:35:15.624676 env[1734]: time="2024-12-13T14:35:15.624487284Z" level=info msg="TearDown network for sandbox \"4ad48fbdfec94c0eea145232236559e847a2d5f4f3f56e87e8fb6042ffe4fdae\" successfully" Dec 13 14:35:15.632107 env[1734]: time="2024-12-13T14:35:15.632064525Z" level=info msg="RemovePodSandbox \"4ad48fbdfec94c0eea145232236559e847a2d5f4f3f56e87e8fb6042ffe4fdae\" returns successfully" Dec 13 14:35:19.282993 systemd[1]: Started sshd@24-172.31.19.209:22-139.178.89.65:59450.service. Dec 13 14:35:19.286838 kernel: kauditd_printk_skb: 559 callbacks suppressed Dec 13 14:35:19.289728 kernel: audit: type=1130 audit(1734100519.284:1848): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.19.209:22-139.178.89.65:59450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:19.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.19.209:22-139.178.89.65:59450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:19.537420 kernel: audit: type=1101 audit(1734100519.532:1849): pid=7095 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:19.532000 audit[7095]: USER_ACCT pid=7095 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:19.546339 kernel: audit: type=1103 audit(1734100519.537:1850): pid=7095 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:19.546536 kernel: audit: type=1006 audit(1734100519.537:1851): pid=7095 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 14:35:19.537000 audit[7095]: CRED_ACQ pid=7095 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:19.546685 sshd[7095]: Accepted publickey for core from 139.178.89.65 port 59450 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:35:19.544288 sshd[7095]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:35:19.537000 audit[7095]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb2546710 a2=3 a3=0 items=0 ppid=1 pid=7095 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:19.556846 kernel: audit: type=1300 audit(1734100519.537:1851): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb2546710 a2=3 a3=0 items=0 ppid=1 pid=7095 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:19.556906 kernel: audit: type=1327 audit(1734100519.537:1851): proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:19.537000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:19.557586 systemd-logind[1722]: New session 25 of user core. Dec 13 14:35:19.558845 systemd[1]: Started session-25.scope. Dec 13 14:35:19.566000 audit[7095]: USER_START pid=7095 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:19.572531 kernel: audit: type=1105 audit(1734100519.566:1852): pid=7095 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:19.573000 audit[7097]: CRED_ACQ pid=7097 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:19.580416 kernel: audit: type=1103 audit(1734100519.573:1853): pid=7097 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:20.334728 sshd[7095]: pam_unix(sshd:session): session closed for user core Dec 13 14:35:20.341000 audit[7095]: USER_END pid=7095 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:20.341000 audit[7095]: CRED_DISP pid=7095 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:20.355121 kernel: audit: type=1106 audit(1734100520.341:1854): pid=7095 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:20.355242 kernel: audit: type=1104 audit(1734100520.341:1855): pid=7095 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:20.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.19.209:22-139.178.89.65:59450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:20.353146 systemd[1]: sshd@24-172.31.19.209:22-139.178.89.65:59450.service: Deactivated successfully. Dec 13 14:35:20.354500 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 14:35:20.356116 systemd-logind[1722]: Session 25 logged out. Waiting for processes to exit. Dec 13 14:35:20.359213 systemd-logind[1722]: Removed session 25. Dec 13 14:35:25.368474 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:35:25.370006 kernel: audit: type=1130 audit(1734100525.362:1857): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.19.209:22-139.178.89.65:59462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:25.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.19.209:22-139.178.89.65:59462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:25.362894 systemd[1]: Started sshd@25-172.31.19.209:22-139.178.89.65:59462.service. Dec 13 14:35:25.572000 audit[7123]: USER_ACCT pid=7123 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:25.578046 sshd[7123]: Accepted publickey for core from 139.178.89.65 port 59462 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:35:25.578689 kernel: audit: type=1101 audit(1734100525.572:1858): pid=7123 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:25.578000 audit[7123]: CRED_ACQ pid=7123 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:25.586878 sshd[7123]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:35:25.587514 kernel: audit: type=1103 audit(1734100525.578:1859): pid=7123 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:25.588259 kernel: audit: type=1006 audit(1734100525.578:1860): pid=7123 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 14:35:25.588418 kernel: audit: type=1300 audit(1734100525.578:1860): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8d7b6d50 a2=3 a3=0 items=0 ppid=1 pid=7123 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:25.578000 audit[7123]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8d7b6d50 a2=3 a3=0 items=0 ppid=1 pid=7123 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:25.594382 kernel: audit: type=1327 audit(1734100525.578:1860): proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:25.578000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:25.601313 systemd[1]: Started session-26.scope. Dec 13 14:35:25.601974 systemd-logind[1722]: New session 26 of user core. Dec 13 14:35:25.610000 audit[7123]: USER_START pid=7123 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:25.610000 audit[7125]: CRED_ACQ pid=7125 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:25.626633 kernel: audit: type=1105 audit(1734100525.610:1861): pid=7123 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:25.626924 kernel: audit: type=1103 audit(1734100525.610:1862): pid=7125 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:25.989057 sshd[7123]: pam_unix(sshd:session): session closed for user core Dec 13 14:35:25.992000 audit[7123]: USER_END pid=7123 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:25.992000 audit[7123]: CRED_DISP pid=7123 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:26.007576 kernel: audit: type=1106 audit(1734100525.992:1863): pid=7123 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:26.007740 kernel: audit: type=1104 audit(1734100525.992:1864): pid=7123 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:26.016184 systemd[1]: sshd@25-172.31.19.209:22-139.178.89.65:59462.service: Deactivated successfully. Dec 13 14:35:26.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.19.209:22-139.178.89.65:59462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:26.017649 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 14:35:26.018617 systemd-logind[1722]: Session 26 logged out. Waiting for processes to exit. Dec 13 14:35:26.019818 systemd-logind[1722]: Removed session 26. Dec 13 14:35:31.049453 systemd[1]: Started sshd@26-172.31.19.209:22-139.178.89.65:44712.service. Dec 13 14:35:31.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.19.209:22-139.178.89.65:44712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:31.052341 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:35:31.053903 kernel: audit: type=1130 audit(1734100531.049:1866): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.19.209:22-139.178.89.65:44712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:31.260000 audit[7137]: USER_ACCT pid=7137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:31.269902 sshd[7137]: Accepted publickey for core from 139.178.89.65 port 44712 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:35:31.270633 kernel: audit: type=1101 audit(1734100531.260:1867): pid=7137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:31.271000 audit[7137]: CRED_ACQ pid=7137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:31.280742 kernel: audit: type=1103 audit(1734100531.271:1868): pid=7137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:31.280930 kernel: audit: type=1006 audit(1734100531.271:1869): pid=7137 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Dec 13 14:35:31.277681 sshd[7137]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:35:31.271000 audit[7137]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe716e8e40 a2=3 a3=0 items=0 ppid=1 pid=7137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:31.287420 kernel: audit: type=1300 audit(1734100531.271:1869): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe716e8e40 a2=3 a3=0 items=0 ppid=1 pid=7137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:31.271000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:31.290455 kernel: audit: type=1327 audit(1734100531.271:1869): proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:31.297894 systemd[1]: Started session-27.scope. Dec 13 14:35:31.300646 systemd-logind[1722]: New session 27 of user core. Dec 13 14:35:31.307000 audit[7137]: USER_START pid=7137 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:31.307000 audit[7139]: CRED_ACQ pid=7139 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:31.319772 kernel: audit: type=1105 audit(1734100531.307:1870): pid=7137 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:31.319903 kernel: audit: type=1103 audit(1734100531.307:1871): pid=7139 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:31.626769 sshd[7137]: pam_unix(sshd:session): session closed for user core Dec 13 14:35:31.629000 audit[7137]: USER_END pid=7137 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:31.630000 audit[7137]: CRED_DISP pid=7137 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:31.636882 systemd[1]: sshd@26-172.31.19.209:22-139.178.89.65:44712.service: Deactivated successfully. Dec 13 14:35:31.638065 systemd[1]: session-27.scope: Deactivated successfully. Dec 13 14:35:31.641250 kernel: audit: type=1106 audit(1734100531.629:1872): pid=7137 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:31.641331 kernel: audit: type=1104 audit(1734100531.630:1873): pid=7137 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:31.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.19.209:22-139.178.89.65:44712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:31.640723 systemd-logind[1722]: Session 27 logged out. Waiting for processes to exit. Dec 13 14:35:31.642481 systemd-logind[1722]: Removed session 27. Dec 13 14:35:36.147170 systemd[1]: run-containerd-runc-k8s.io-e9f9640baa8851deff6e9852ec6bdc20abab7903ee903736adb4cd7d8d5df4a0-runc.51l2mP.mount: Deactivated successfully. Dec 13 14:35:36.585957 systemd[1]: run-containerd-runc-k8s.io-6921b63dfd65640c38964a69c478d0168ef4a91224fbd5f1c4d4832d3a09af93-runc.qP67rh.mount: Deactivated successfully. Dec 13 14:35:36.654487 systemd[1]: Started sshd@27-172.31.19.209:22-139.178.89.65:44728.service. Dec 13 14:35:36.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.19.209:22-139.178.89.65:44728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:36.656413 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:35:36.656592 kernel: audit: type=1130 audit(1734100536.654:1875): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.19.209:22-139.178.89.65:44728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:36.905000 audit[7209]: USER_ACCT pid=7209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:36.927576 kernel: audit: type=1101 audit(1734100536.905:1876): pid=7209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:36.927688 kernel: audit: type=1103 audit(1734100536.912:1877): pid=7209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:36.927732 kernel: audit: type=1006 audit(1734100536.912:1878): pid=7209 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Dec 13 14:35:36.927766 kernel: audit: type=1300 audit(1734100536.912:1878): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0bb693f0 a2=3 a3=0 items=0 ppid=1 pid=7209 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:36.912000 audit[7209]: CRED_ACQ pid=7209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:36.912000 audit[7209]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0bb693f0 a2=3 a3=0 items=0 ppid=1 pid=7209 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:36.912000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:36.929514 sshd[7209]: Accepted publickey for core from 139.178.89.65 port 44728 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:35:36.929845 kernel: audit: type=1327 audit(1734100536.912:1878): proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:36.916530 sshd[7209]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:35:36.938672 systemd-logind[1722]: New session 28 of user core. Dec 13 14:35:36.941169 systemd[1]: Started session-28.scope. Dec 13 14:35:36.958000 audit[7209]: USER_START pid=7209 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:36.965501 kernel: audit: type=1105 audit(1734100536.958:1879): pid=7209 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:36.991000 audit[7217]: CRED_ACQ pid=7217 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:37.003207 kernel: audit: type=1103 audit(1734100536.991:1880): pid=7217 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:37.165180 kubelet[2802]: I1213 14:35:37.137152 2802 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-jj5m4" podStartSLOduration=31.114953569 podStartE2EDuration="31.114953569s" podCreationTimestamp="2024-12-13 14:35:06 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:35:11.66829331 +0000 UTC m=+120.110669687" watchObservedRunningTime="2024-12-13 14:35:37.114953569 +0000 UTC m=+145.557329976" Dec 13 14:35:37.603845 sshd[7209]: pam_unix(sshd:session): session closed for user core Dec 13 14:35:37.609000 audit[7209]: USER_END pid=7209 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:37.615378 kernel: audit: type=1106 audit(1734100537.609:1881): pid=7209 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:37.609000 audit[7209]: CRED_DISP pid=7209 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:37.618454 systemd-logind[1722]: Session 28 logged out. Waiting for processes to exit. Dec 13 14:35:37.621167 systemd[1]: sshd@27-172.31.19.209:22-139.178.89.65:44728.service: Deactivated successfully. Dec 13 14:35:37.621617 kernel: audit: type=1104 audit(1734100537.609:1882): pid=7209 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:35:37.622362 systemd[1]: session-28.scope: Deactivated successfully. Dec 13 14:35:37.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.19.209:22-139.178.89.65:44728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:37.623701 systemd-logind[1722]: Removed session 28. Dec 13 14:35:51.445040 systemd[1]: cri-containerd-bea8a05236a0e15d5fa01c1a5ca419d2cab218f6f387697b693733091a6215ec.scope: Deactivated successfully. Dec 13 14:35:51.445605 systemd[1]: cri-containerd-bea8a05236a0e15d5fa01c1a5ca419d2cab218f6f387697b693733091a6215ec.scope: Consumed 4.133s CPU time. Dec 13 14:35:51.451406 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:35:51.451530 kernel: audit: type=1334 audit(1734100551.448:1884): prog-id=81 op=UNLOAD Dec 13 14:35:51.451566 kernel: audit: type=1334 audit(1734100551.448:1885): prog-id=83 op=UNLOAD Dec 13 14:35:51.448000 audit: BPF prog-id=81 op=UNLOAD Dec 13 14:35:51.448000 audit: BPF prog-id=83 op=UNLOAD Dec 13 14:35:51.497174 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-bea8a05236a0e15d5fa01c1a5ca419d2cab218f6f387697b693733091a6215ec-rootfs.mount: Deactivated successfully. Dec 13 14:35:51.502574 env[1734]: time="2024-12-13T14:35:51.502502216Z" level=info msg="shim disconnected" id=bea8a05236a0e15d5fa01c1a5ca419d2cab218f6f387697b693733091a6215ec Dec 13 14:35:51.506440 env[1734]: time="2024-12-13T14:35:51.504924955Z" level=warning msg="cleaning up after shim disconnected" id=bea8a05236a0e15d5fa01c1a5ca419d2cab218f6f387697b693733091a6215ec namespace=k8s.io Dec 13 14:35:51.506440 env[1734]: time="2024-12-13T14:35:51.504964032Z" level=info msg="cleaning up dead shim" Dec 13 14:35:51.519867 env[1734]: time="2024-12-13T14:35:51.519806391Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:35:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=7240 runtime=io.containerd.runc.v2\n" Dec 13 14:35:51.677388 kubelet[2802]: I1213 14:35:51.676948 2802 scope.go:117] "RemoveContainer" containerID="bea8a05236a0e15d5fa01c1a5ca419d2cab218f6f387697b693733091a6215ec" Dec 13 14:35:51.759418 env[1734]: time="2024-12-13T14:35:51.758161009Z" level=info msg="CreateContainer within sandbox \"e1d939760a7245176284a92333c4666376450ec05312d85ba026bface57dce1c\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Dec 13 14:35:51.827619 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2289476776.mount: Deactivated successfully. Dec 13 14:35:51.841593 env[1734]: time="2024-12-13T14:35:51.841535594Z" level=info msg="CreateContainer within sandbox \"e1d939760a7245176284a92333c4666376450ec05312d85ba026bface57dce1c\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"8815c46ef639213dcc7db2561bb2020682284d6d18bd89361eceab747ca99761\"" Dec 13 14:35:51.842820 env[1734]: time="2024-12-13T14:35:51.842777620Z" level=info msg="StartContainer for \"8815c46ef639213dcc7db2561bb2020682284d6d18bd89361eceab747ca99761\"" Dec 13 14:35:51.844447 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1429823791.mount: Deactivated successfully. Dec 13 14:35:51.873820 systemd[1]: Started cri-containerd-8815c46ef639213dcc7db2561bb2020682284d6d18bd89361eceab747ca99761.scope. Dec 13 14:35:51.924075 kernel: audit: type=1400 audit(1734100551.909:1886): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.924240 kernel: audit: type=1400 audit(1734100551.909:1887): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.924299 kernel: audit: type=1400 audit(1734100551.909:1888): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.946070 kernel: audit: type=1400 audit(1734100551.909:1889): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.946217 kernel: audit: type=1400 audit(1734100551.909:1890): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.957514 kernel: audit: type=1400 audit(1734100551.909:1891): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.957636 kernel: audit: type=1400 audit(1734100551.909:1892): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.962127 kernel: audit: type=1400 audit(1734100551.909:1893): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.916000 audit: BPF prog-id=261 op=LOAD Dec 13 14:35:51.917000 audit[7260]: AVC avc: denied { bpf } for pid=7260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.917000 audit[7260]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2415 pid=7260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:51.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838313563343665663633393231336463633764623235363162623230 Dec 13 14:35:51.917000 audit[7260]: AVC avc: denied { perfmon } for pid=7260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.917000 audit[7260]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2415 pid=7260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:51.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838313563343665663633393231336463633764623235363162623230 Dec 13 14:35:51.917000 audit[7260]: AVC avc: denied { bpf } for pid=7260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.917000 audit[7260]: AVC avc: denied { bpf } for pid=7260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.917000 audit[7260]: AVC avc: denied { bpf } for pid=7260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.917000 audit[7260]: AVC avc: denied { perfmon } for pid=7260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.917000 audit[7260]: AVC avc: denied { perfmon } for pid=7260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.917000 audit[7260]: AVC avc: denied { perfmon } for pid=7260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.917000 audit[7260]: AVC avc: denied { perfmon } for pid=7260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.917000 audit[7260]: AVC avc: denied { perfmon } for pid=7260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.917000 audit[7260]: AVC avc: denied { bpf } for pid=7260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.917000 audit[7260]: AVC avc: denied { bpf } for pid=7260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.917000 audit: BPF prog-id=262 op=LOAD Dec 13 14:35:51.917000 audit[7260]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000337d40 items=0 ppid=2415 pid=7260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:51.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838313563343665663633393231336463633764623235363162623230 Dec 13 14:35:51.923000 audit[7260]: AVC avc: denied { bpf } for pid=7260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.923000 audit[7260]: AVC avc: denied { bpf } for pid=7260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.923000 audit[7260]: AVC avc: denied { perfmon } for pid=7260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.923000 audit[7260]: AVC avc: denied { perfmon } for pid=7260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.923000 audit[7260]: AVC avc: denied { perfmon } for pid=7260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.923000 audit[7260]: AVC avc: denied { perfmon } for pid=7260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.923000 audit[7260]: AVC avc: denied { perfmon } for pid=7260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.923000 audit[7260]: AVC avc: denied { bpf } for pid=7260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.923000 audit[7260]: AVC avc: denied { bpf } for pid=7260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.923000 audit: BPF prog-id=263 op=LOAD Dec 13 14:35:51.923000 audit[7260]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000337d88 items=0 ppid=2415 pid=7260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:51.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838313563343665663633393231336463633764623235363162623230 Dec 13 14:35:51.923000 audit: BPF prog-id=263 op=UNLOAD Dec 13 14:35:51.923000 audit: BPF prog-id=262 op=UNLOAD Dec 13 14:35:51.924000 audit[7260]: AVC avc: denied { bpf } for pid=7260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.924000 audit[7260]: AVC avc: denied { bpf } for pid=7260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.924000 audit[7260]: AVC avc: denied { bpf } for pid=7260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.924000 audit[7260]: AVC avc: denied { perfmon } for pid=7260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.924000 audit[7260]: AVC avc: denied { perfmon } for pid=7260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.924000 audit[7260]: AVC avc: denied { perfmon } for pid=7260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.924000 audit[7260]: AVC avc: denied { perfmon } for pid=7260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.924000 audit[7260]: AVC avc: denied { perfmon } for pid=7260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.924000 audit[7260]: AVC avc: denied { bpf } for pid=7260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.924000 audit[7260]: AVC avc: denied { bpf } for pid=7260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:51.924000 audit: BPF prog-id=264 op=LOAD Dec 13 14:35:51.924000 audit[7260]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00039e198 items=0 ppid=2415 pid=7260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:51.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838313563343665663633393231336463633764623235363162623230 Dec 13 14:35:52.009711 env[1734]: time="2024-12-13T14:35:52.009576140Z" level=info msg="StartContainer for \"8815c46ef639213dcc7db2561bb2020682284d6d18bd89361eceab747ca99761\" returns successfully" Dec 13 14:35:52.485735 systemd[1]: cri-containerd-17772cfd40a05b2cad69bc405ce5ea13164d78e0d15cdde7846ca27b52e1ef7e.scope: Deactivated successfully. Dec 13 14:35:52.486184 systemd[1]: cri-containerd-17772cfd40a05b2cad69bc405ce5ea13164d78e0d15cdde7846ca27b52e1ef7e.scope: Consumed 2.974s CPU time. Dec 13 14:35:52.485000 audit: BPF prog-id=114 op=UNLOAD Dec 13 14:35:52.489000 audit: BPF prog-id=117 op=UNLOAD Dec 13 14:35:52.529417 env[1734]: time="2024-12-13T14:35:52.525680907Z" level=info msg="shim disconnected" id=17772cfd40a05b2cad69bc405ce5ea13164d78e0d15cdde7846ca27b52e1ef7e Dec 13 14:35:52.529417 env[1734]: time="2024-12-13T14:35:52.525748170Z" level=warning msg="cleaning up after shim disconnected" id=17772cfd40a05b2cad69bc405ce5ea13164d78e0d15cdde7846ca27b52e1ef7e namespace=k8s.io Dec 13 14:35:52.529417 env[1734]: time="2024-12-13T14:35:52.525779029Z" level=info msg="cleaning up dead shim" Dec 13 14:35:52.526041 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-17772cfd40a05b2cad69bc405ce5ea13164d78e0d15cdde7846ca27b52e1ef7e-rootfs.mount: Deactivated successfully. Dec 13 14:35:52.541069 env[1734]: time="2024-12-13T14:35:52.541011711Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:35:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=7302 runtime=io.containerd.runc.v2\n" Dec 13 14:35:52.676172 kubelet[2802]: I1213 14:35:52.676140 2802 scope.go:117] "RemoveContainer" containerID="17772cfd40a05b2cad69bc405ce5ea13164d78e0d15cdde7846ca27b52e1ef7e" Dec 13 14:35:52.701534 amazon-ssm-agent[1708]: 2024-12-13 14:35:52 INFO [HealthCheck] HealthCheck reporting agent health. Dec 13 14:35:52.708693 env[1734]: time="2024-12-13T14:35:52.702368480Z" level=info msg="CreateContainer within sandbox \"e3b17823f83755ea400541e5e31ec15213b6a17c1d81c85e45d8ccde3bcf8637\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Dec 13 14:35:52.744551 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1049455180.mount: Deactivated successfully. Dec 13 14:35:52.756859 env[1734]: time="2024-12-13T14:35:52.756802628Z" level=info msg="CreateContainer within sandbox \"e3b17823f83755ea400541e5e31ec15213b6a17c1d81c85e45d8ccde3bcf8637\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"bb19f7256a3b10b64d4f1edb2299bb67a19ed9cadd35d1f2aaea0b89f1b2a2d1\"" Dec 13 14:35:52.759405 env[1734]: time="2024-12-13T14:35:52.757818259Z" level=info msg="StartContainer for \"bb19f7256a3b10b64d4f1edb2299bb67a19ed9cadd35d1f2aaea0b89f1b2a2d1\"" Dec 13 14:35:52.808375 systemd[1]: Started cri-containerd-bb19f7256a3b10b64d4f1edb2299bb67a19ed9cadd35d1f2aaea0b89f1b2a2d1.scope. Dec 13 14:35:52.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.848000 audit: BPF prog-id=265 op=LOAD Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { bpf } for pid=7325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2953 pid=7325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:52.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262313966373235366133623130623634643466316564623232393962 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { perfmon } for pid=7325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2953 pid=7325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:52.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262313966373235366133623130623634643466316564623232393962 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { bpf } for pid=7325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { bpf } for pid=7325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { bpf } for pid=7325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { perfmon } for pid=7325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { perfmon } for pid=7325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { perfmon } for pid=7325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { perfmon } for pid=7325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { perfmon } for pid=7325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { bpf } for pid=7325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { bpf } for pid=7325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit: BPF prog-id=266 op=LOAD Dec 13 14:35:52.849000 audit[7325]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00034a1c0 items=0 ppid=2953 pid=7325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:52.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262313966373235366133623130623634643466316564623232393962 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { bpf } for pid=7325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { bpf } for pid=7325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { perfmon } for pid=7325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { perfmon } for pid=7325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { perfmon } for pid=7325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { perfmon } for pid=7325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { perfmon } for pid=7325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { bpf } for pid=7325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { bpf } for pid=7325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit: BPF prog-id=267 op=LOAD Dec 13 14:35:52.849000 audit[7325]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00034a208 items=0 ppid=2953 pid=7325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:52.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262313966373235366133623130623634643466316564623232393962 Dec 13 14:35:52.849000 audit: BPF prog-id=267 op=UNLOAD Dec 13 14:35:52.849000 audit: BPF prog-id=266 op=UNLOAD Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { bpf } for pid=7325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { bpf } for pid=7325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { bpf } for pid=7325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { perfmon } for pid=7325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { perfmon } for pid=7325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { perfmon } for pid=7325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { perfmon } for pid=7325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { perfmon } for pid=7325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { bpf } for pid=7325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit[7325]: AVC avc: denied { bpf } for pid=7325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:52.849000 audit: BPF prog-id=268 op=LOAD Dec 13 14:35:52.849000 audit[7325]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00034a618 items=0 ppid=2953 pid=7325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:52.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262313966373235366133623130623634643466316564623232393962 Dec 13 14:35:52.895502 env[1734]: time="2024-12-13T14:35:52.895439748Z" level=info msg="StartContainer for \"bb19f7256a3b10b64d4f1edb2299bb67a19ed9cadd35d1f2aaea0b89f1b2a2d1\" returns successfully" Dec 13 14:35:53.600000 audit[7272]: AVC avc: denied { watch } for pid=7272 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:53.600000 audit[7272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b30210 a2=fc6 a3=0 items=0 ppid=2415 pid=7272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 key=(null) Dec 13 14:35:53.600000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:35:53.601000 audit[7272]: AVC avc: denied { watch } for pid=7272 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:53.601000 audit[7272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000152140 a2=fc6 a3=0 items=0 ppid=2415 pid=7272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c107,c184 key=(null) Dec 13 14:35:53.601000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:35:55.476012 kubelet[2802]: E1213 14:35:55.475951 2802 controller.go:195] "Failed to update lease" err="Put \"https://172.31.19.209:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-19-209?timeout=10s\": context deadline exceeded" Dec 13 14:35:57.586626 systemd[1]: cri-containerd-e6f10cabf1ec447463659008198887f7323a527fea4987ec9dec73a2d22c4212.scope: Deactivated successfully. Dec 13 14:35:57.589939 systemd[1]: cri-containerd-e6f10cabf1ec447463659008198887f7323a527fea4987ec9dec73a2d22c4212.scope: Consumed 1.317s CPU time. Dec 13 14:35:57.599002 kernel: kauditd_printk_skb: 114 callbacks suppressed Dec 13 14:35:57.599160 kernel: audit: type=1334 audit(1734100557.594:1926): prog-id=73 op=UNLOAD Dec 13 14:35:57.599220 kernel: audit: type=1334 audit(1734100557.594:1927): prog-id=102 op=UNLOAD Dec 13 14:35:57.594000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:35:57.594000 audit: BPF prog-id=102 op=UNLOAD Dec 13 14:35:57.635632 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e6f10cabf1ec447463659008198887f7323a527fea4987ec9dec73a2d22c4212-rootfs.mount: Deactivated successfully. Dec 13 14:35:57.641294 env[1734]: time="2024-12-13T14:35:57.641217002Z" level=info msg="shim disconnected" id=e6f10cabf1ec447463659008198887f7323a527fea4987ec9dec73a2d22c4212 Dec 13 14:35:57.641940 env[1734]: time="2024-12-13T14:35:57.641302378Z" level=warning msg="cleaning up after shim disconnected" id=e6f10cabf1ec447463659008198887f7323a527fea4987ec9dec73a2d22c4212 namespace=k8s.io Dec 13 14:35:57.641940 env[1734]: time="2024-12-13T14:35:57.641315927Z" level=info msg="cleaning up dead shim" Dec 13 14:35:57.658319 env[1734]: time="2024-12-13T14:35:57.658269237Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:35:57Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=7378 runtime=io.containerd.runc.v2\n" Dec 13 14:35:57.739817 kubelet[2802]: I1213 14:35:57.739774 2802 scope.go:117] "RemoveContainer" containerID="e6f10cabf1ec447463659008198887f7323a527fea4987ec9dec73a2d22c4212" Dec 13 14:35:57.748723 env[1734]: time="2024-12-13T14:35:57.748664815Z" level=info msg="CreateContainer within sandbox \"3ebb4ac1624234c00f749a26705947cca17d242bf63822c249639f96cb645850\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Dec 13 14:35:57.812938 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount387212917.mount: Deactivated successfully. Dec 13 14:35:57.844035 env[1734]: time="2024-12-13T14:35:57.843918793Z" level=info msg="CreateContainer within sandbox \"3ebb4ac1624234c00f749a26705947cca17d242bf63822c249639f96cb645850\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"af6b046976482359a5decc62cc6f3c7b85dccee4a4e094123fe2e78f6363e76d\"" Dec 13 14:35:57.845756 env[1734]: time="2024-12-13T14:35:57.845712042Z" level=info msg="StartContainer for \"af6b046976482359a5decc62cc6f3c7b85dccee4a4e094123fe2e78f6363e76d\"" Dec 13 14:35:57.879481 systemd[1]: Started cri-containerd-af6b046976482359a5decc62cc6f3c7b85dccee4a4e094123fe2e78f6363e76d.scope. Dec 13 14:35:57.911708 kernel: audit: type=1400 audit(1734100557.902:1928): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.911886 kernel: audit: type=1400 audit(1734100557.902:1929): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.924885 kernel: audit: type=1400 audit(1734100557.902:1930): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.925327 kernel: audit: type=1400 audit(1734100557.902:1931): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.925406 kernel: audit: type=1400 audit(1734100557.902:1932): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.937379 kernel: audit: type=1400 audit(1734100557.902:1933): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.951053 kernel: audit: type=1400 audit(1734100557.902:1934): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.951240 kernel: audit: type=1400 audit(1734100557.902:1935): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.903000 audit: BPF prog-id=269 op=LOAD Dec 13 14:35:57.903000 audit[7399]: AVC avc: denied { bpf } for pid=7399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.903000 audit[7399]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2402 pid=7399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:57.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166366230343639373634383233353961356465636336326363366633 Dec 13 14:35:57.903000 audit[7399]: AVC avc: denied { perfmon } for pid=7399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.903000 audit[7399]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2402 pid=7399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:57.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166366230343639373634383233353961356465636336326363366633 Dec 13 14:35:57.903000 audit[7399]: AVC avc: denied { bpf } for pid=7399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.903000 audit[7399]: AVC avc: denied { bpf } for pid=7399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.903000 audit[7399]: AVC avc: denied { bpf } for pid=7399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.903000 audit[7399]: AVC avc: denied { perfmon } for pid=7399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.903000 audit[7399]: AVC avc: denied { perfmon } for pid=7399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.903000 audit[7399]: AVC avc: denied { perfmon } for pid=7399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.903000 audit[7399]: AVC avc: denied { perfmon } for pid=7399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.903000 audit[7399]: AVC avc: denied { perfmon } for pid=7399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.903000 audit[7399]: AVC avc: denied { bpf } for pid=7399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.903000 audit[7399]: AVC avc: denied { bpf } for pid=7399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.903000 audit: BPF prog-id=270 op=LOAD Dec 13 14:35:57.903000 audit[7399]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000331d40 items=0 ppid=2402 pid=7399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:57.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166366230343639373634383233353961356465636336326363366633 Dec 13 14:35:57.911000 audit[7399]: AVC avc: denied { bpf } for pid=7399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.911000 audit[7399]: AVC avc: denied { bpf } for pid=7399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.911000 audit[7399]: AVC avc: denied { perfmon } for pid=7399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.911000 audit[7399]: AVC avc: denied { perfmon } for pid=7399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.911000 audit[7399]: AVC avc: denied { perfmon } for pid=7399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.911000 audit[7399]: AVC avc: denied { perfmon } for pid=7399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.911000 audit[7399]: AVC avc: denied { perfmon } for pid=7399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.911000 audit[7399]: AVC avc: denied { bpf } for pid=7399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.911000 audit[7399]: AVC avc: denied { bpf } for pid=7399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.911000 audit: BPF prog-id=271 op=LOAD Dec 13 14:35:57.911000 audit[7399]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000331d88 items=0 ppid=2402 pid=7399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:57.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166366230343639373634383233353961356465636336326363366633 Dec 13 14:35:57.911000 audit: BPF prog-id=271 op=UNLOAD Dec 13 14:35:57.911000 audit: BPF prog-id=270 op=UNLOAD Dec 13 14:35:57.911000 audit[7399]: AVC avc: denied { bpf } for pid=7399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.911000 audit[7399]: AVC avc: denied { bpf } for pid=7399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.911000 audit[7399]: AVC avc: denied { bpf } for pid=7399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.911000 audit[7399]: AVC avc: denied { perfmon } for pid=7399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.911000 audit[7399]: AVC avc: denied { perfmon } for pid=7399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.911000 audit[7399]: AVC avc: denied { perfmon } for pid=7399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.911000 audit[7399]: AVC avc: denied { perfmon } for pid=7399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.911000 audit[7399]: AVC avc: denied { perfmon } for pid=7399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.911000 audit[7399]: AVC avc: denied { bpf } for pid=7399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.911000 audit[7399]: AVC avc: denied { bpf } for pid=7399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:35:57.911000 audit: BPF prog-id=272 op=LOAD Dec 13 14:35:57.911000 audit[7399]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003a4198 items=0 ppid=2402 pid=7399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:57.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166366230343639373634383233353961356465636336326363366633 Dec 13 14:35:58.001172 env[1734]: time="2024-12-13T14:35:58.001116668Z" level=info msg="StartContainer for \"af6b046976482359a5decc62cc6f3c7b85dccee4a4e094123fe2e78f6363e76d\" returns successfully" Dec 13 14:36:05.476756 kubelet[2802]: E1213 14:36:05.476702 2802 controller.go:195] "Failed to update lease" err="Put \"https://172.31.19.209:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-19-209?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 13 14:36:06.453000 audit[2574]: AVC avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:06.464573 kernel: kauditd_printk_skb: 49 callbacks suppressed Dec 13 14:36:06.464737 kernel: audit: type=1400 audit(1734100566.453:1946): avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:06.464780 kernel: audit: type=1400 audit(1734100566.453:1947): avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:06.453000 audit[2574]: AVC avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:06.453000 audit[2574]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=59 a1=c007fa5170 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:36:06.487677 kernel: audit: type=1300 audit(1734100566.453:1947): arch=c000003e syscall=254 success=no exit=-13 a0=59 a1=c007fa5170 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:36:06.453000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:36:06.453000 audit[2574]: AVC avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:06.510438 kernel: audit: type=1327 audit(1734100566.453:1947): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:36:06.511631 kernel: audit: type=1400 audit(1734100566.453:1948): avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:06.511702 kernel: audit: type=1300 audit(1734100566.453:1948): arch=c000003e syscall=254 success=no exit=-13 a0=59 a1=c007fa5200 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:36:06.453000 audit[2574]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=59 a1=c007fa5200 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:36:06.453000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:36:06.522112 kernel: audit: type=1327 audit(1734100566.453:1948): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:36:06.522339 kernel: audit: type=1400 audit(1734100566.453:1949): avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:06.453000 audit[2574]: AVC avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:06.453000 audit[2574]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=59 a1=c007fa5230 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:36:06.532018 kernel: audit: type=1300 audit(1734100566.453:1949): arch=c000003e syscall=254 success=no exit=-13 a0=59 a1=c007fa5230 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:36:06.532584 kernel: audit: type=1327 audit(1734100566.453:1949): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:36:06.453000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:36:06.453000 audit[2574]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c00c9f3b40 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:36:06.453000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:36:06.459000 audit[2574]: AVC avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:06.459000 audit[2574]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c00c9f3e40 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:36:06.459000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:36:06.464000 audit[2574]: AVC avc: denied { watch } for pid=2574 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:06.464000 audit[2574]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c007fa5590 a2=fc6 a3=0 items=0 ppid=2440 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c883,c981 key=(null) Dec 13 14:36:06.464000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E323039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:36:11.080000 audit[4924]: AVC avc: denied { watch } for pid=4924 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_33_45.763121275/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c579,c662 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c579,c662 tclass=file permissive=0 Dec 13 14:36:11.080000 audit[4924]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000fae620 a2=fc6 a3=0 items=0 ppid=4498 pid=4924 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c579,c662 key=(null) Dec 13 14:36:11.080000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274