Dec 13 14:15:07.999974 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Dec 13 14:15:08.000027 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Dec 13 12:58:58 -00 2024 Dec 13 14:15:08.000057 kernel: efi: EFI v2.70 by EDK II Dec 13 14:15:08.000073 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7b003a98 MEMRESERVE=0x7171cf98 Dec 13 14:15:08.000088 kernel: ACPI: Early table checksum verification disabled Dec 13 14:15:08.000102 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Dec 13 14:15:08.000191 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Dec 13 14:15:08.000218 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Dec 13 14:15:08.000234 kernel: ACPI: DSDT 0x0000000078640000 00159D (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Dec 13 14:15:08.000249 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Dec 13 14:15:08.000273 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Dec 13 14:15:08.000288 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Dec 13 14:15:08.000303 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Dec 13 14:15:08.000318 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Dec 13 14:15:08.000335 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Dec 13 14:15:08.000359 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Dec 13 14:15:08.000374 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Dec 13 14:15:08.000390 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Dec 13 14:15:08.000405 kernel: printk: bootconsole [uart0] enabled Dec 13 14:15:08.000421 kernel: NUMA: Failed to initialise from firmware Dec 13 14:15:08.000438 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Dec 13 14:15:08.000472 kernel: NUMA: NODE_DATA [mem 0x4b5843900-0x4b5848fff] Dec 13 14:15:08.000492 kernel: Zone ranges: Dec 13 14:15:08.000508 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Dec 13 14:15:08.000525 kernel: DMA32 empty Dec 13 14:15:08.000541 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Dec 13 14:15:08.000567 kernel: Movable zone start for each node Dec 13 14:15:08.000584 kernel: Early memory node ranges Dec 13 14:15:08.000618 kernel: node 0: [mem 0x0000000040000000-0x000000007862ffff] Dec 13 14:15:08.000637 kernel: node 0: [mem 0x0000000078630000-0x000000007863ffff] Dec 13 14:15:08.000653 kernel: node 0: [mem 0x0000000078640000-0x00000000786effff] Dec 13 14:15:08.000668 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Dec 13 14:15:08.000683 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Dec 13 14:15:08.000697 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Dec 13 14:15:08.000726 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Dec 13 14:15:08.000747 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Dec 13 14:15:08.000762 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Dec 13 14:15:08.000777 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Dec 13 14:15:08.000799 kernel: psci: probing for conduit method from ACPI. Dec 13 14:15:08.000814 kernel: psci: PSCIv1.0 detected in firmware. Dec 13 14:15:08.000835 kernel: psci: Using standard PSCI v0.2 function IDs Dec 13 14:15:08.000851 kernel: psci: Trusted OS migration not required Dec 13 14:15:08.000866 kernel: psci: SMC Calling Convention v1.1 Dec 13 14:15:08.000886 kernel: ACPI: SRAT not present Dec 13 14:15:08.000902 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Dec 13 14:15:08.000918 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Dec 13 14:15:08.000944 kernel: pcpu-alloc: [0] 0 [0] 1 Dec 13 14:15:08.000963 kernel: Detected PIPT I-cache on CPU0 Dec 13 14:15:08.000979 kernel: CPU features: detected: GIC system register CPU interface Dec 13 14:15:08.000994 kernel: CPU features: detected: Spectre-v2 Dec 13 14:15:08.001009 kernel: CPU features: detected: Spectre-v3a Dec 13 14:15:08.002569 kernel: CPU features: detected: Spectre-BHB Dec 13 14:15:08.002593 kernel: CPU features: kernel page table isolation forced ON by KASLR Dec 13 14:15:08.002609 kernel: CPU features: detected: Kernel page table isolation (KPTI) Dec 13 14:15:08.002633 kernel: CPU features: detected: ARM erratum 1742098 Dec 13 14:15:08.002649 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Dec 13 14:15:08.002664 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Dec 13 14:15:08.002680 kernel: Policy zone: Normal Dec 13 14:15:08.002698 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 14:15:08.002715 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:15:08.002730 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:15:08.002745 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:15:08.002761 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:15:08.002776 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Dec 13 14:15:08.002797 kernel: Memory: 3824524K/4030464K available (9792K kernel code, 2092K rwdata, 7576K rodata, 36416K init, 777K bss, 205940K reserved, 0K cma-reserved) Dec 13 14:15:08.002814 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:15:08.002829 kernel: trace event string verifier disabled Dec 13 14:15:08.002844 kernel: rcu: Preemptible hierarchical RCU implementation. Dec 13 14:15:08.002860 kernel: rcu: RCU event tracing is enabled. Dec 13 14:15:08.002876 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:15:08.002892 kernel: Trampoline variant of Tasks RCU enabled. Dec 13 14:15:08.002908 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:15:08.002923 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:15:08.002939 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:15:08.002954 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Dec 13 14:15:08.002970 kernel: GICv3: 96 SPIs implemented Dec 13 14:15:08.002989 kernel: GICv3: 0 Extended SPIs implemented Dec 13 14:15:08.003004 kernel: GICv3: Distributor has no Range Selector support Dec 13 14:15:08.003019 kernel: Root IRQ handler: gic_handle_irq Dec 13 14:15:08.003034 kernel: GICv3: 16 PPIs implemented Dec 13 14:15:08.003049 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Dec 13 14:15:08.003064 kernel: ACPI: SRAT not present Dec 13 14:15:08.003079 kernel: ITS [mem 0x10080000-0x1009ffff] Dec 13 14:15:08.003095 kernel: ITS@0x0000000010080000: allocated 8192 Devices @400090000 (indirect, esz 8, psz 64K, shr 1) Dec 13 14:15:08.003151 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000a0000 (flat, esz 8, psz 64K, shr 1) Dec 13 14:15:08.003170 kernel: GICv3: using LPI property table @0x00000004000b0000 Dec 13 14:15:08.003185 kernel: ITS: Using hypervisor restricted LPI range [128] Dec 13 14:15:08.003206 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Dec 13 14:15:08.003222 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Dec 13 14:15:08.003237 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Dec 13 14:15:08.003253 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Dec 13 14:15:08.003268 kernel: Console: colour dummy device 80x25 Dec 13 14:15:08.003284 kernel: printk: console [tty1] enabled Dec 13 14:15:08.003300 kernel: ACPI: Core revision 20210730 Dec 13 14:15:08.003316 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Dec 13 14:15:08.003332 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:15:08.003347 kernel: LSM: Security Framework initializing Dec 13 14:15:08.003367 kernel: SELinux: Initializing. Dec 13 14:15:08.003383 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:15:08.003399 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:15:08.003415 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:15:08.003431 kernel: Platform MSI: ITS@0x10080000 domain created Dec 13 14:15:08.003446 kernel: PCI/MSI: ITS@0x10080000 domain created Dec 13 14:15:08.003461 kernel: Remapping and enabling EFI services. Dec 13 14:15:08.003477 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:15:08.003493 kernel: Detected PIPT I-cache on CPU1 Dec 13 14:15:08.003508 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Dec 13 14:15:08.003528 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Dec 13 14:15:08.003545 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Dec 13 14:15:08.003561 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:15:08.003577 kernel: SMP: Total of 2 processors activated. Dec 13 14:15:08.003593 kernel: CPU features: detected: 32-bit EL0 Support Dec 13 14:15:08.003611 kernel: CPU features: detected: 32-bit EL1 Support Dec 13 14:15:08.003628 kernel: CPU features: detected: CRC32 instructions Dec 13 14:15:08.003645 kernel: CPU: All CPU(s) started at EL1 Dec 13 14:15:08.003661 kernel: alternatives: patching kernel code Dec 13 14:15:08.003687 kernel: devtmpfs: initialized Dec 13 14:15:08.003704 kernel: KASLR disabled due to lack of seed Dec 13 14:15:08.003733 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:15:08.003778 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:15:08.003798 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:15:08.003814 kernel: SMBIOS 3.0.0 present. Dec 13 14:15:08.003831 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Dec 13 14:15:08.003848 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:15:08.003865 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Dec 13 14:15:08.003883 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Dec 13 14:15:08.003900 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Dec 13 14:15:08.003932 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:15:08.003949 kernel: audit: type=2000 audit(0.291:1): state=initialized audit_enabled=0 res=1 Dec 13 14:15:08.003966 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:15:08.003983 kernel: cpuidle: using governor menu Dec 13 14:15:08.004000 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Dec 13 14:15:08.004027 kernel: ASID allocator initialised with 32768 entries Dec 13 14:15:08.004044 kernel: ACPI: bus type PCI registered Dec 13 14:15:08.004061 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:15:08.004077 kernel: Serial: AMBA PL011 UART driver Dec 13 14:15:08.004095 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:15:08.004143 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Dec 13 14:15:08.004165 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:15:08.004188 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Dec 13 14:15:08.004205 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:15:08.004234 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Dec 13 14:15:08.004252 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:15:08.004269 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:15:08.004287 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:15:08.004305 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:15:08.004323 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:15:08.004341 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:15:08.004359 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:15:08.004377 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:15:08.004402 kernel: ACPI: Interpreter enabled Dec 13 14:15:08.004421 kernel: ACPI: Using GIC for interrupt routing Dec 13 14:15:08.004439 kernel: ACPI: MCFG table detected, 1 entries Dec 13 14:15:08.004456 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Dec 13 14:15:08.004767 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:15:08.004964 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Dec 13 14:15:08.005205 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Dec 13 14:15:08.005396 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Dec 13 14:15:08.005658 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Dec 13 14:15:08.005691 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Dec 13 14:15:08.005710 kernel: acpiphp: Slot [1] registered Dec 13 14:15:08.005728 kernel: acpiphp: Slot [2] registered Dec 13 14:15:08.005745 kernel: acpiphp: Slot [3] registered Dec 13 14:15:08.005762 kernel: acpiphp: Slot [4] registered Dec 13 14:15:08.005778 kernel: acpiphp: Slot [5] registered Dec 13 14:15:08.005796 kernel: acpiphp: Slot [6] registered Dec 13 14:15:08.005813 kernel: acpiphp: Slot [7] registered Dec 13 14:15:08.005843 kernel: acpiphp: Slot [8] registered Dec 13 14:15:08.005860 kernel: acpiphp: Slot [9] registered Dec 13 14:15:08.005877 kernel: acpiphp: Slot [10] registered Dec 13 14:15:08.005893 kernel: acpiphp: Slot [11] registered Dec 13 14:15:08.005910 kernel: acpiphp: Slot [12] registered Dec 13 14:15:08.005927 kernel: acpiphp: Slot [13] registered Dec 13 14:15:08.005945 kernel: acpiphp: Slot [14] registered Dec 13 14:15:08.005962 kernel: acpiphp: Slot [15] registered Dec 13 14:15:08.005978 kernel: acpiphp: Slot [16] registered Dec 13 14:15:08.006003 kernel: acpiphp: Slot [17] registered Dec 13 14:15:08.006021 kernel: acpiphp: Slot [18] registered Dec 13 14:15:08.006038 kernel: acpiphp: Slot [19] registered Dec 13 14:15:08.006056 kernel: acpiphp: Slot [20] registered Dec 13 14:15:08.006072 kernel: acpiphp: Slot [21] registered Dec 13 14:15:08.006089 kernel: acpiphp: Slot [22] registered Dec 13 14:15:08.006149 kernel: acpiphp: Slot [23] registered Dec 13 14:15:08.006176 kernel: acpiphp: Slot [24] registered Dec 13 14:15:08.006194 kernel: acpiphp: Slot [25] registered Dec 13 14:15:08.006211 kernel: acpiphp: Slot [26] registered Dec 13 14:15:08.006237 kernel: acpiphp: Slot [27] registered Dec 13 14:15:08.006255 kernel: acpiphp: Slot [28] registered Dec 13 14:15:08.006272 kernel: acpiphp: Slot [29] registered Dec 13 14:15:08.006289 kernel: acpiphp: Slot [30] registered Dec 13 14:15:08.006306 kernel: acpiphp: Slot [31] registered Dec 13 14:15:08.006323 kernel: PCI host bridge to bus 0000:00 Dec 13 14:15:08.006564 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Dec 13 14:15:08.006761 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Dec 13 14:15:08.006942 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Dec 13 14:15:08.007145 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Dec 13 14:15:08.007411 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Dec 13 14:15:08.007735 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Dec 13 14:15:08.008046 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Dec 13 14:15:08.008346 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Dec 13 14:15:08.008574 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Dec 13 14:15:08.008774 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 14:15:08.008985 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Dec 13 14:15:08.009212 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Dec 13 14:15:08.009514 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Dec 13 14:15:08.009780 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Dec 13 14:15:08.010045 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 14:15:08.021378 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Dec 13 14:15:08.021597 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Dec 13 14:15:08.021797 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Dec 13 14:15:08.021988 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Dec 13 14:15:08.022253 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Dec 13 14:15:08.022528 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Dec 13 14:15:08.022778 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Dec 13 14:15:08.023036 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Dec 13 14:15:08.023064 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Dec 13 14:15:08.023082 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Dec 13 14:15:08.023099 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Dec 13 14:15:08.023138 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Dec 13 14:15:08.023156 kernel: iommu: Default domain type: Translated Dec 13 14:15:08.023173 kernel: iommu: DMA domain TLB invalidation policy: strict mode Dec 13 14:15:08.023190 kernel: vgaarb: loaded Dec 13 14:15:08.023206 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:15:08.023229 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:15:08.023245 kernel: PTP clock support registered Dec 13 14:15:08.023262 kernel: Registered efivars operations Dec 13 14:15:08.023278 kernel: clocksource: Switched to clocksource arch_sys_counter Dec 13 14:15:08.023295 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:15:08.023311 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:15:08.023328 kernel: pnp: PnP ACPI init Dec 13 14:15:08.023534 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Dec 13 14:15:08.023574 kernel: pnp: PnP ACPI: found 1 devices Dec 13 14:15:08.023593 kernel: NET: Registered PF_INET protocol family Dec 13 14:15:08.023610 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:15:08.023626 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 14:15:08.023643 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:15:08.023660 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:15:08.023676 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 14:15:08.023692 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 14:15:08.023709 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:15:08.023729 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:15:08.023760 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:15:08.023781 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:15:08.023814 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Dec 13 14:15:08.023832 kernel: kvm [1]: HYP mode not available Dec 13 14:15:08.023848 kernel: Initialise system trusted keyrings Dec 13 14:15:08.023865 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 14:15:08.023881 kernel: Key type asymmetric registered Dec 13 14:15:08.023897 kernel: Asymmetric key parser 'x509' registered Dec 13 14:15:08.023919 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:15:08.023935 kernel: io scheduler mq-deadline registered Dec 13 14:15:08.023960 kernel: io scheduler kyber registered Dec 13 14:15:08.023983 kernel: io scheduler bfq registered Dec 13 14:15:08.024333 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Dec 13 14:15:08.024370 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Dec 13 14:15:08.024388 kernel: ACPI: button: Power Button [PWRB] Dec 13 14:15:08.024405 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input1 Dec 13 14:15:08.024433 kernel: ACPI: button: Sleep Button [SLPB] Dec 13 14:15:08.024452 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:15:08.024470 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Dec 13 14:15:08.024738 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Dec 13 14:15:08.024770 kernel: printk: console [ttyS0] disabled Dec 13 14:15:08.024789 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Dec 13 14:15:08.024806 kernel: printk: console [ttyS0] enabled Dec 13 14:15:08.024824 kernel: printk: bootconsole [uart0] disabled Dec 13 14:15:08.024841 kernel: thunder_xcv, ver 1.0 Dec 13 14:15:08.024858 kernel: thunder_bgx, ver 1.0 Dec 13 14:15:08.024882 kernel: nicpf, ver 1.0 Dec 13 14:15:08.024898 kernel: nicvf, ver 1.0 Dec 13 14:15:08.025159 kernel: rtc-efi rtc-efi.0: registered as rtc0 Dec 13 14:15:08.025346 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-12-13T14:15:07 UTC (1734099307) Dec 13 14:15:08.025370 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 14:15:08.025387 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:15:08.025403 kernel: Segment Routing with IPv6 Dec 13 14:15:08.025419 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:15:08.025441 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:15:08.025458 kernel: Key type dns_resolver registered Dec 13 14:15:08.025474 kernel: registered taskstats version 1 Dec 13 14:15:08.034196 kernel: Loading compiled-in X.509 certificates Dec 13 14:15:08.034227 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e011ba9949ade5a6d03f7a5e28171f7f59e70f8a' Dec 13 14:15:08.034244 kernel: Key type .fscrypt registered Dec 13 14:15:08.034261 kernel: Key type fscrypt-provisioning registered Dec 13 14:15:08.034278 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:15:08.034294 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:15:08.034320 kernel: ima: No architecture policies found Dec 13 14:15:08.034336 kernel: clk: Disabling unused clocks Dec 13 14:15:08.034352 kernel: Freeing unused kernel memory: 36416K Dec 13 14:15:08.034368 kernel: Run /init as init process Dec 13 14:15:08.034384 kernel: with arguments: Dec 13 14:15:08.034400 kernel: /init Dec 13 14:15:08.034416 kernel: with environment: Dec 13 14:15:08.034432 kernel: HOME=/ Dec 13 14:15:08.034448 kernel: TERM=linux Dec 13 14:15:08.034468 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:15:08.034491 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:15:08.034513 systemd[1]: Detected virtualization amazon. Dec 13 14:15:08.034531 systemd[1]: Detected architecture arm64. Dec 13 14:15:08.034549 systemd[1]: Running in initrd. Dec 13 14:15:08.034566 systemd[1]: No hostname configured, using default hostname. Dec 13 14:15:08.034595 systemd[1]: Hostname set to . Dec 13 14:15:08.034623 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:15:08.034642 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:15:08.034660 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:15:08.034678 systemd[1]: Reached target cryptsetup.target. Dec 13 14:15:08.034696 systemd[1]: Reached target paths.target. Dec 13 14:15:08.034713 systemd[1]: Reached target slices.target. Dec 13 14:15:08.034731 systemd[1]: Reached target swap.target. Dec 13 14:15:08.034748 systemd[1]: Reached target timers.target. Dec 13 14:15:08.034771 systemd[1]: Listening on iscsid.socket. Dec 13 14:15:08.034789 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:15:08.034806 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:15:08.034824 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:15:08.034842 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:15:08.034860 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:15:08.034878 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:15:08.034896 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:15:08.034917 systemd[1]: Reached target sockets.target. Dec 13 14:15:08.034935 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:15:08.034953 systemd[1]: Finished network-cleanup.service. Dec 13 14:15:08.034970 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:15:08.034988 systemd[1]: Starting systemd-journald.service... Dec 13 14:15:08.035006 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:15:08.035025 systemd[1]: Starting systemd-resolved.service... Dec 13 14:15:08.035044 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:15:08.035063 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:15:08.035093 kernel: audit: type=1130 audit(1734099308.003:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:08.035148 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:15:08.035171 kernel: audit: type=1130 audit(1734099308.015:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:08.035189 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:15:08.035207 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:15:08.035237 systemd-journald[310]: Journal started Dec 13 14:15:08.035386 systemd-journald[310]: Runtime Journal (/run/log/journal/ec256fc88df64424ee23ec7962e3eddf) is 8.0M, max 75.4M, 67.4M free. Dec 13 14:15:08.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:08.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:07.996656 systemd-modules-load[311]: Inserted module 'overlay' Dec 13 14:15:08.044748 kernel: audit: type=1130 audit(1734099308.028:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:08.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:08.058030 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:15:08.058161 systemd[1]: Started systemd-journald.service. Dec 13 14:15:08.075184 kernel: audit: type=1130 audit(1734099308.065:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:08.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:08.088766 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:15:08.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:08.110173 kernel: audit: type=1130 audit(1734099308.088:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:08.110245 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:15:08.110762 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:15:08.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:08.128151 kernel: audit: type=1130 audit(1734099308.111:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:08.122433 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:15:08.132996 systemd-resolved[312]: Positive Trust Anchors: Dec 13 14:15:08.135365 systemd-resolved[312]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:15:08.138301 kernel: Bridge firewalling registered Dec 13 14:15:08.137363 systemd-modules-load[311]: Inserted module 'br_netfilter' Dec 13 14:15:08.141492 systemd-resolved[312]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:15:08.166706 kernel: SCSI subsystem initialized Dec 13 14:15:08.168960 dracut-cmdline[327]: dracut-dracut-053 Dec 13 14:15:08.185568 dracut-cmdline[327]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 14:15:08.205226 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:15:08.205268 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:15:08.205293 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:15:08.204318 systemd-modules-load[311]: Inserted module 'dm_multipath' Dec 13 14:15:08.206746 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:15:08.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:08.222153 kernel: audit: type=1130 audit(1734099308.209:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:08.220365 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:15:08.244968 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:15:08.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:08.256199 kernel: audit: type=1130 audit(1734099308.245:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:08.368141 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:15:08.389149 kernel: iscsi: registered transport (tcp) Dec 13 14:15:08.416153 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:15:08.416236 kernel: QLogic iSCSI HBA Driver Dec 13 14:15:08.608157 kernel: random: crng init done Dec 13 14:15:08.608086 systemd-resolved[312]: Defaulting to hostname 'linux'. Dec 13 14:15:08.612553 systemd[1]: Started systemd-resolved.service. Dec 13 14:15:08.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:08.624627 kernel: audit: type=1130 audit(1734099308.613:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:08.622556 systemd[1]: Reached target nss-lookup.target. Dec 13 14:15:08.644454 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:15:08.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:08.647593 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:15:08.714150 kernel: raid6: neonx8 gen() 6291 MB/s Dec 13 14:15:08.732144 kernel: raid6: neonx8 xor() 4760 MB/s Dec 13 14:15:08.750139 kernel: raid6: neonx4 gen() 6357 MB/s Dec 13 14:15:08.768139 kernel: raid6: neonx4 xor() 4940 MB/s Dec 13 14:15:08.786139 kernel: raid6: neonx2 gen() 5638 MB/s Dec 13 14:15:08.804139 kernel: raid6: neonx2 xor() 4517 MB/s Dec 13 14:15:08.822139 kernel: raid6: neonx1 gen() 4374 MB/s Dec 13 14:15:08.840139 kernel: raid6: neonx1 xor() 3667 MB/s Dec 13 14:15:08.858158 kernel: raid6: int64x8 gen() 3373 MB/s Dec 13 14:15:08.876162 kernel: raid6: int64x8 xor() 2049 MB/s Dec 13 14:15:08.894162 kernel: raid6: int64x4 gen() 3666 MB/s Dec 13 14:15:08.912154 kernel: raid6: int64x4 xor() 2159 MB/s Dec 13 14:15:08.930153 kernel: raid6: int64x2 gen() 3459 MB/s Dec 13 14:15:08.948153 kernel: raid6: int64x2 xor() 1905 MB/s Dec 13 14:15:08.966157 kernel: raid6: int64x1 gen() 2707 MB/s Dec 13 14:15:08.985505 kernel: raid6: int64x1 xor() 1424 MB/s Dec 13 14:15:08.985583 kernel: raid6: using algorithm neonx4 gen() 6357 MB/s Dec 13 14:15:08.985612 kernel: raid6: .... xor() 4940 MB/s, rmw enabled Dec 13 14:15:08.987226 kernel: raid6: using neon recovery algorithm Dec 13 14:15:09.007165 kernel: xor: measuring software checksum speed Dec 13 14:15:09.010669 kernel: 8regs : 8684 MB/sec Dec 13 14:15:09.010723 kernel: 32regs : 11124 MB/sec Dec 13 14:15:09.012605 kernel: arm64_neon : 9382 MB/sec Dec 13 14:15:09.012647 kernel: xor: using function: 32regs (11124 MB/sec) Dec 13 14:15:09.113203 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Dec 13 14:15:09.137039 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:15:09.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:09.139000 audit: BPF prog-id=7 op=LOAD Dec 13 14:15:09.139000 audit: BPF prog-id=8 op=LOAD Dec 13 14:15:09.142019 systemd[1]: Starting systemd-udevd.service... Dec 13 14:15:09.174220 systemd-udevd[509]: Using default interface naming scheme 'v252'. Dec 13 14:15:09.186081 systemd[1]: Started systemd-udevd.service. Dec 13 14:15:09.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:09.194765 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:15:09.226987 dracut-pre-trigger[519]: rd.md=0: removing MD RAID activation Dec 13 14:15:09.305815 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:15:09.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:09.309879 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:15:09.417584 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:15:09.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:09.569696 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Dec 13 14:15:09.569805 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Dec 13 14:15:09.593982 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Dec 13 14:15:09.594016 kernel: nvme nvme0: pci function 0000:00:04.0 Dec 13 14:15:09.594371 kernel: ena 0000:00:05.0: ENA device version: 0.10 Dec 13 14:15:09.594599 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Dec 13 14:15:09.594845 kernel: nvme nvme0: 2/0/0 default/read/poll queues Dec 13 14:15:09.595171 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:71:2f:94:44:29 Dec 13 14:15:09.604362 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:15:09.604445 kernel: GPT:9289727 != 16777215 Dec 13 14:15:09.606639 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:15:09.608021 kernel: GPT:9289727 != 16777215 Dec 13 14:15:09.609952 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:15:09.611560 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:15:09.617208 (udev-worker)[559]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:15:09.687179 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (555) Dec 13 14:15:09.758571 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:15:09.780669 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:15:09.833330 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:15:09.856500 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:15:09.860812 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:15:09.867573 systemd[1]: Starting disk-uuid.service... Dec 13 14:15:09.880332 disk-uuid[667]: Primary Header is updated. Dec 13 14:15:09.880332 disk-uuid[667]: Secondary Entries is updated. Dec 13 14:15:09.880332 disk-uuid[667]: Secondary Header is updated. Dec 13 14:15:09.891160 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:15:09.899137 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:15:09.908157 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:15:10.911158 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:15:10.913089 disk-uuid[668]: The operation has completed successfully. Dec 13 14:15:11.095708 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:15:11.096432 systemd[1]: Finished disk-uuid.service. Dec 13 14:15:11.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:11.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:11.121077 systemd[1]: Starting verity-setup.service... Dec 13 14:15:11.158445 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Dec 13 14:15:11.268309 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:15:11.273282 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:15:11.276516 systemd[1]: Finished verity-setup.service. Dec 13 14:15:11.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:11.370156 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:15:11.371511 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:15:11.374419 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:15:11.378365 systemd[1]: Starting ignition-setup.service... Dec 13 14:15:11.387100 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:15:11.414976 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:15:11.415047 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:15:11.417098 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:15:11.427181 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:15:11.445976 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:15:11.462532 systemd[1]: Finished ignition-setup.service. Dec 13 14:15:11.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:11.465816 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:15:11.532811 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:15:11.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:11.536000 audit: BPF prog-id=9 op=LOAD Dec 13 14:15:11.538219 systemd[1]: Starting systemd-networkd.service... Dec 13 14:15:11.586050 systemd-networkd[1180]: lo: Link UP Dec 13 14:15:11.586075 systemd-networkd[1180]: lo: Gained carrier Dec 13 14:15:11.589799 systemd-networkd[1180]: Enumeration completed Dec 13 14:15:11.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:11.590393 systemd-networkd[1180]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:15:11.590699 systemd[1]: Started systemd-networkd.service. Dec 13 14:15:11.592626 systemd[1]: Reached target network.target. Dec 13 14:15:11.603408 systemd-networkd[1180]: eth0: Link UP Dec 13 14:15:11.603416 systemd-networkd[1180]: eth0: Gained carrier Dec 13 14:15:11.604307 systemd[1]: Starting iscsiuio.service... Dec 13 14:15:11.618569 systemd[1]: Started iscsiuio.service. Dec 13 14:15:11.620236 systemd-networkd[1180]: eth0: DHCPv4 address 172.31.24.217/20, gateway 172.31.16.1 acquired from 172.31.16.1 Dec 13 14:15:11.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:11.626964 systemd[1]: Starting iscsid.service... Dec 13 14:15:11.638565 iscsid[1186]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:15:11.638565 iscsid[1186]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:15:11.638565 iscsid[1186]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:15:11.638565 iscsid[1186]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:15:11.638565 iscsid[1186]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:15:11.658618 iscsid[1186]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:15:11.677078 kernel: kauditd_printk_skb: 15 callbacks suppressed Dec 13 14:15:11.678454 kernel: audit: type=1130 audit(1734099311.658:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:11.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:11.655816 systemd[1]: Started iscsid.service. Dec 13 14:15:11.662166 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:15:11.699086 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:15:11.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:11.702552 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:15:11.713393 kernel: audit: type=1130 audit(1734099311.701:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:11.711659 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:15:11.715053 systemd[1]: Reached target remote-fs.target. Dec 13 14:15:11.723048 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:15:11.745715 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:15:11.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:11.756186 kernel: audit: type=1130 audit(1734099311.747:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.197205 ignition[1124]: Ignition 2.14.0 Dec 13 14:15:12.197767 ignition[1124]: Stage: fetch-offline Dec 13 14:15:12.198268 ignition[1124]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:12.198568 ignition[1124]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:12.218795 ignition[1124]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:12.221217 ignition[1124]: Ignition finished successfully Dec 13 14:15:12.224316 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:15:12.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.235151 kernel: audit: type=1130 audit(1734099312.225:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.236486 systemd[1]: Starting ignition-fetch.service... Dec 13 14:15:12.253323 ignition[1205]: Ignition 2.14.0 Dec 13 14:15:12.253362 ignition[1205]: Stage: fetch Dec 13 14:15:12.253763 ignition[1205]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:12.253846 ignition[1205]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:12.270017 ignition[1205]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:12.272296 ignition[1205]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:12.284119 ignition[1205]: INFO : PUT result: OK Dec 13 14:15:12.287843 ignition[1205]: DEBUG : parsed url from cmdline: "" Dec 13 14:15:12.287843 ignition[1205]: INFO : no config URL provided Dec 13 14:15:12.291193 ignition[1205]: INFO : reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:15:12.291193 ignition[1205]: INFO : no config at "/usr/lib/ignition/user.ign" Dec 13 14:15:12.291193 ignition[1205]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:12.322955 ignition[1205]: INFO : PUT result: OK Dec 13 14:15:12.322955 ignition[1205]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Dec 13 14:15:12.322955 ignition[1205]: INFO : GET result: OK Dec 13 14:15:12.322955 ignition[1205]: DEBUG : parsing config with SHA512: 44d5779f9acbfab28d8559fb74bd7c80553cfa17ba7af26891786e8493f1303a0595524845ac619826fbc55da094f9ce883be0c052abd80fb1d5f2f6285bc678 Dec 13 14:15:12.322279 ignition[1205]: fetch: fetch complete Dec 13 14:15:12.317433 unknown[1205]: fetched base config from "system" Dec 13 14:15:12.322470 ignition[1205]: fetch: fetch passed Dec 13 14:15:12.317450 unknown[1205]: fetched base config from "system" Dec 13 14:15:12.322598 ignition[1205]: Ignition finished successfully Dec 13 14:15:12.317465 unknown[1205]: fetched user config from "aws" Dec 13 14:15:12.341768 systemd[1]: Finished ignition-fetch.service. Dec 13 14:15:12.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.345993 systemd[1]: Starting ignition-kargs.service... Dec 13 14:15:12.355073 kernel: audit: type=1130 audit(1734099312.343:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.368226 ignition[1211]: Ignition 2.14.0 Dec 13 14:15:12.368256 ignition[1211]: Stage: kargs Dec 13 14:15:12.368549 ignition[1211]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:12.368603 ignition[1211]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:12.382777 ignition[1211]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:12.384955 ignition[1211]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:12.388068 ignition[1211]: INFO : PUT result: OK Dec 13 14:15:12.392326 ignition[1211]: kargs: kargs passed Dec 13 14:15:12.392424 ignition[1211]: Ignition finished successfully Dec 13 14:15:12.396313 systemd[1]: Finished ignition-kargs.service. Dec 13 14:15:12.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.405627 systemd[1]: Starting ignition-disks.service... Dec 13 14:15:12.410144 kernel: audit: type=1130 audit(1734099312.395:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.421168 ignition[1217]: Ignition 2.14.0 Dec 13 14:15:12.421197 ignition[1217]: Stage: disks Dec 13 14:15:12.421498 ignition[1217]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:12.421561 ignition[1217]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:12.435495 ignition[1217]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:12.437749 ignition[1217]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:12.440863 ignition[1217]: INFO : PUT result: OK Dec 13 14:15:12.445265 ignition[1217]: disks: disks passed Dec 13 14:15:12.445363 ignition[1217]: Ignition finished successfully Dec 13 14:15:12.449664 systemd[1]: Finished ignition-disks.service. Dec 13 14:15:12.459493 kernel: audit: type=1130 audit(1734099312.450:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.451425 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:15:12.461066 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:15:12.465368 systemd[1]: Reached target local-fs.target. Dec 13 14:15:12.468163 systemd[1]: Reached target sysinit.target. Dec 13 14:15:12.470911 systemd[1]: Reached target basic.target. Dec 13 14:15:12.475430 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:15:12.517256 systemd-fsck[1225]: ROOT: clean, 621/553520 files, 56020/553472 blocks Dec 13 14:15:12.524739 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:15:12.535996 kernel: audit: type=1130 audit(1734099312.525:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.528945 systemd[1]: Mounting sysroot.mount... Dec 13 14:15:12.560161 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:15:12.561826 systemd[1]: Mounted sysroot.mount. Dec 13 14:15:12.564895 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:15:12.571320 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:15:12.575417 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:15:12.575552 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:15:12.575628 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:15:12.597352 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:15:12.617593 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:15:12.625686 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:15:12.638817 initrd-setup-root[1247]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:15:12.653795 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1242) Dec 13 14:15:12.659782 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:15:12.659868 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:15:12.662165 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:15:12.663459 initrd-setup-root[1255]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:15:12.663495 systemd-networkd[1180]: eth0: Gained IPv6LL Dec 13 14:15:12.676547 initrd-setup-root[1279]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:15:12.680380 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:15:12.685750 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:15:12.694963 initrd-setup-root[1289]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:15:12.857813 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:15:12.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.862934 systemd[1]: Starting ignition-mount.service... Dec 13 14:15:12.874013 kernel: audit: type=1130 audit(1734099312.859:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.873403 systemd[1]: Starting sysroot-boot.service... Dec 13 14:15:12.887465 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:15:12.889442 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:15:12.909606 ignition[1307]: INFO : Ignition 2.14.0 Dec 13 14:15:12.909606 ignition[1307]: INFO : Stage: mount Dec 13 14:15:12.912896 ignition[1307]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:12.912896 ignition[1307]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:12.933662 systemd[1]: Finished sysroot-boot.service. Dec 13 14:15:12.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.944091 ignition[1307]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:12.944091 ignition[1307]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:12.948712 kernel: audit: type=1130 audit(1734099312.935:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.953411 ignition[1307]: INFO : PUT result: OK Dec 13 14:15:12.959146 ignition[1307]: INFO : mount: mount passed Dec 13 14:15:12.960889 ignition[1307]: INFO : Ignition finished successfully Dec 13 14:15:12.963774 systemd[1]: Finished ignition-mount.service. Dec 13 14:15:12.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:12.968818 systemd[1]: Starting ignition-files.service... Dec 13 14:15:12.987078 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:15:13.011148 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1317) Dec 13 14:15:13.017068 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:15:13.017161 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:15:13.017189 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:15:13.026150 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:15:13.031556 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:15:13.051539 ignition[1336]: INFO : Ignition 2.14.0 Dec 13 14:15:13.051539 ignition[1336]: INFO : Stage: files Dec 13 14:15:13.054908 ignition[1336]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:13.054908 ignition[1336]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:13.073211 ignition[1336]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:13.076134 ignition[1336]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:13.078871 ignition[1336]: INFO : PUT result: OK Dec 13 14:15:13.086009 ignition[1336]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:15:13.091888 ignition[1336]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:15:13.094628 ignition[1336]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:15:13.124711 ignition[1336]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:15:13.127981 ignition[1336]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:15:13.131090 unknown[1336]: wrote ssh authorized keys file for user: core Dec 13 14:15:13.133326 ignition[1336]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:15:13.137402 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Dec 13 14:15:13.141056 ignition[1336]: INFO : GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Dec 13 14:15:13.268469 ignition[1336]: INFO : GET result: OK Dec 13 14:15:13.445332 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Dec 13 14:15:13.445332 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Dec 13 14:15:13.458167 ignition[1336]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:15:13.462451 ignition[1336]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2884849599" Dec 13 14:15:13.468996 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1338) Dec 13 14:15:13.469040 ignition[1336]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2884849599": device or resource busy Dec 13 14:15:13.469040 ignition[1336]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2884849599", trying btrfs: device or resource busy Dec 13 14:15:13.469040 ignition[1336]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2884849599" Dec 13 14:15:13.478593 ignition[1336]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2884849599" Dec 13 14:15:13.482216 ignition[1336]: INFO : op(3): [started] unmounting "/mnt/oem2884849599" Dec 13 14:15:13.484476 ignition[1336]: INFO : op(3): [finished] unmounting "/mnt/oem2884849599" Dec 13 14:15:13.484476 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Dec 13 14:15:13.484476 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:15:13.493334 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:15:13.496648 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:15:13.500176 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:15:13.503484 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:15:13.506835 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:15:13.510147 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:15:13.517592 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:15:13.521406 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:15:13.527535 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:15:13.527535 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Dec 13 14:15:13.527535 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Dec 13 14:15:13.527535 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Dec 13 14:15:13.527535 ignition[1336]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:15:13.553420 ignition[1336]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2394727077" Dec 13 14:15:13.556408 ignition[1336]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2394727077": device or resource busy Dec 13 14:15:13.556408 ignition[1336]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2394727077", trying btrfs: device or resource busy Dec 13 14:15:13.562810 ignition[1336]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2394727077" Dec 13 14:15:13.562810 ignition[1336]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2394727077" Dec 13 14:15:13.572068 ignition[1336]: INFO : op(6): [started] unmounting "/mnt/oem2394727077" Dec 13 14:15:13.574385 ignition[1336]: INFO : op(6): [finished] unmounting "/mnt/oem2394727077" Dec 13 14:15:13.574385 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Dec 13 14:15:13.574385 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Dec 13 14:15:13.574385 ignition[1336]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:15:13.585910 systemd[1]: mnt-oem2394727077.mount: Deactivated successfully. Dec 13 14:15:13.603285 ignition[1336]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2514085112" Dec 13 14:15:13.605976 ignition[1336]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2514085112": device or resource busy Dec 13 14:15:13.605976 ignition[1336]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2514085112", trying btrfs: device or resource busy Dec 13 14:15:13.605976 ignition[1336]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2514085112" Dec 13 14:15:13.605976 ignition[1336]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2514085112" Dec 13 14:15:13.626561 ignition[1336]: INFO : op(9): [started] unmounting "/mnt/oem2514085112" Dec 13 14:15:13.626561 ignition[1336]: INFO : op(9): [finished] unmounting "/mnt/oem2514085112" Dec 13 14:15:13.626561 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Dec 13 14:15:13.626561 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:15:13.626561 ignition[1336]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:15:13.619946 systemd[1]: mnt-oem2514085112.mount: Deactivated successfully. Dec 13 14:15:13.662896 ignition[1336]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3330117795" Dec 13 14:15:13.665694 ignition[1336]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3330117795": device or resource busy Dec 13 14:15:13.665694 ignition[1336]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3330117795", trying btrfs: device or resource busy Dec 13 14:15:13.665694 ignition[1336]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3330117795" Dec 13 14:15:13.688578 ignition[1336]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3330117795" Dec 13 14:15:13.688578 ignition[1336]: INFO : op(c): [started] unmounting "/mnt/oem3330117795" Dec 13 14:15:13.688578 ignition[1336]: INFO : op(c): [finished] unmounting "/mnt/oem3330117795" Dec 13 14:15:13.688578 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:15:13.688578 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Dec 13 14:15:13.688578 ignition[1336]: INFO : GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-arm64.raw: attempt #1 Dec 13 14:15:14.180252 ignition[1336]: INFO : GET result: OK Dec 13 14:15:14.563358 systemd[1]: mnt-oem3330117795.mount: Deactivated successfully. Dec 13 14:15:14.818561 ignition[1336]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Dec 13 14:15:14.818561 ignition[1336]: INFO : files: op(f): [started] processing unit "amazon-ssm-agent.service" Dec 13 14:15:14.825262 ignition[1336]: INFO : files: op(f): op(10): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Dec 13 14:15:14.825262 ignition[1336]: INFO : files: op(f): op(10): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Dec 13 14:15:14.825262 ignition[1336]: INFO : files: op(f): [finished] processing unit "amazon-ssm-agent.service" Dec 13 14:15:14.825262 ignition[1336]: INFO : files: op(11): [started] processing unit "nvidia.service" Dec 13 14:15:14.825262 ignition[1336]: INFO : files: op(11): [finished] processing unit "nvidia.service" Dec 13 14:15:14.825262 ignition[1336]: INFO : files: op(12): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:15:14.825262 ignition[1336]: INFO : files: op(12): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:15:14.825262 ignition[1336]: INFO : files: op(13): [started] processing unit "prepare-helm.service" Dec 13 14:15:14.825262 ignition[1336]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:15:14.856959 ignition[1336]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:15:14.856959 ignition[1336]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" Dec 13 14:15:14.856959 ignition[1336]: INFO : files: op(15): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:15:14.856959 ignition[1336]: INFO : files: op(15): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:15:14.856959 ignition[1336]: INFO : files: op(16): [started] setting preset to enabled for "prepare-helm.service" Dec 13 14:15:14.856959 ignition[1336]: INFO : files: op(16): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 14:15:14.856959 ignition[1336]: INFO : files: op(17): [started] setting preset to enabled for "amazon-ssm-agent.service" Dec 13 14:15:14.856959 ignition[1336]: INFO : files: op(17): [finished] setting preset to enabled for "amazon-ssm-agent.service" Dec 13 14:15:14.856959 ignition[1336]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" Dec 13 14:15:14.856959 ignition[1336]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" Dec 13 14:15:14.885672 ignition[1336]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:15:14.885672 ignition[1336]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:15:14.885672 ignition[1336]: INFO : files: files passed Dec 13 14:15:14.885672 ignition[1336]: INFO : Ignition finished successfully Dec 13 14:15:14.900950 systemd[1]: Finished ignition-files.service. Dec 13 14:15:14.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:14.911789 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:15:14.913811 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:15:14.915495 systemd[1]: Starting ignition-quench.service... Dec 13 14:15:14.929620 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:15:14.931617 systemd[1]: Finished ignition-quench.service. Dec 13 14:15:14.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:14.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:14.941252 initrd-setup-root-after-ignition[1361]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:15:14.946170 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:15:14.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:14.949952 systemd[1]: Reached target ignition-complete.target. Dec 13 14:15:14.954590 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:15:14.986733 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:15:14.988697 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:15:14.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:14.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:14.992264 systemd[1]: Reached target initrd-fs.target. Dec 13 14:15:14.995366 systemd[1]: Reached target initrd.target. Dec 13 14:15:14.998474 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:15:15.002897 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:15:15.032966 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:15:15.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.037469 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:15:15.063226 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:15:15.067140 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:15:15.070978 systemd[1]: Stopped target timers.target. Dec 13 14:15:15.074398 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:15:15.076451 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:15:15.080222 systemd[1]: Stopped target initrd.target. Dec 13 14:15:15.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.083284 systemd[1]: Stopped target basic.target. Dec 13 14:15:15.086656 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:15:15.090530 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:15:15.094180 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:15:15.097888 systemd[1]: Stopped target remote-fs.target. Dec 13 14:15:15.101274 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:15:15.104755 systemd[1]: Stopped target sysinit.target. Dec 13 14:15:15.108075 systemd[1]: Stopped target local-fs.target. Dec 13 14:15:15.112078 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:15:15.115540 systemd[1]: Stopped target swap.target. Dec 13 14:15:15.118376 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:15:15.120620 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:15:15.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.124185 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:15:15.127375 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:15:15.129603 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:15:15.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.133158 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:15:15.135664 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:15:15.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.139545 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:15:15.139826 systemd[1]: Stopped ignition-files.service. Dec 13 14:15:15.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.146885 systemd[1]: Stopping ignition-mount.service... Dec 13 14:15:15.158603 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:15:15.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.160409 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:15:15.160716 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:15:15.163786 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:15:15.164076 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:15:15.183977 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:15:15.186223 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:15:15.187826 ignition[1374]: INFO : Ignition 2.14.0 Dec 13 14:15:15.187826 ignition[1374]: INFO : Stage: umount Dec 13 14:15:15.191163 ignition[1374]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:15.191163 ignition[1374]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:15.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.211424 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:15:15.220509 ignition[1374]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:15.223566 ignition[1374]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:15.227206 ignition[1374]: INFO : PUT result: OK Dec 13 14:15:15.233211 ignition[1374]: INFO : umount: umount passed Dec 13 14:15:15.234997 ignition[1374]: INFO : Ignition finished successfully Dec 13 14:15:15.238792 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:15:15.240705 systemd[1]: Stopped ignition-mount.service. Dec 13 14:15:15.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.244872 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:15:15.244998 systemd[1]: Stopped ignition-disks.service. Dec 13 14:15:15.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.249590 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:15:15.249730 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:15:15.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.254990 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:15:15.255220 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:15:15.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.260284 systemd[1]: Stopped target network.target. Dec 13 14:15:15.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.264407 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:15:15.264597 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:15:15.266662 systemd[1]: Stopped target paths.target. Dec 13 14:15:15.268303 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:15:15.274228 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:15:15.278977 systemd[1]: Stopped target slices.target. Dec 13 14:15:15.282088 systemd[1]: Stopped target sockets.target. Dec 13 14:15:15.286590 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:15:15.286675 systemd[1]: Closed iscsid.socket. Dec 13 14:15:15.291861 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:15:15.291944 systemd[1]: Closed iscsiuio.socket. Dec 13 14:15:15.297477 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:15:15.297615 systemd[1]: Stopped ignition-setup.service. Dec 13 14:15:15.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.302439 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:15:15.305765 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:15:15.310203 systemd-networkd[1180]: eth0: DHCPv6 lease lost Dec 13 14:15:15.314297 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:15:15.314550 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:15:15.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.322487 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:15:15.324982 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:15:15.325000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:15:15.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.331914 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:15:15.331987 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:15:15.330000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:15:15.338941 systemd[1]: Stopping network-cleanup.service... Dec 13 14:15:15.344131 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:15:15.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.344349 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:15:15.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.350143 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:15:15.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.350273 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:15:15.352645 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:15:15.354318 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:15:15.374043 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:15:15.382654 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:15:15.388234 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:15:15.390391 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:15:15.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.393830 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:15:15.396326 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:15:15.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.402895 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:15:15.403787 systemd[1]: Stopped network-cleanup.service. Dec 13 14:15:15.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.406974 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:15:15.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.407716 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:15:15.410035 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:15:15.410375 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:15:15.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.412815 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:15:15.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.413035 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:15:15.416026 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:15:15.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.416577 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:15:15.419450 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:15:15.419556 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:15:15.421471 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:15:15.421598 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:15:15.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.427040 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:15:15.441580 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:15:15.441711 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:15:15.445432 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:15:15.445534 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:15:15.458269 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:15:15.458402 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:15:15.462645 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 14:15:15.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:15.463776 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:15:15.463991 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:15:15.481917 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:15:15.498285 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:15:15.516044 systemd[1]: Switching root. Dec 13 14:15:15.548136 systemd-journald[310]: Received SIGTERM from PID 1 (systemd). Dec 13 14:15:15.548221 iscsid[1186]: iscsid shutting down. Dec 13 14:15:15.551337 systemd-journald[310]: Journal stopped Dec 13 14:15:21.452503 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:15:21.452677 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:15:21.452732 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:15:21.452785 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:15:21.452823 kernel: SELinux: policy capability open_perms=1 Dec 13 14:15:21.452859 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:15:21.452892 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:15:21.452926 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:15:21.452979 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:15:21.453017 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:15:21.453058 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:15:21.453098 systemd[1]: Successfully loaded SELinux policy in 115.688ms. Dec 13 14:15:21.456816 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 31.314ms. Dec 13 14:15:21.456874 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:15:21.456919 systemd[1]: Detected virtualization amazon. Dec 13 14:15:21.456960 systemd[1]: Detected architecture arm64. Dec 13 14:15:21.457000 systemd[1]: Detected first boot. Dec 13 14:15:21.457049 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:15:21.457088 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:15:21.457456 kernel: kauditd_printk_skb: 49 callbacks suppressed Dec 13 14:15:21.457501 kernel: audit: type=1400 audit(1734099316.748:85): avc: denied { associate } for pid=1407 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:15:21.458269 kernel: audit: type=1300 audit(1734099316.748:85): arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458ac a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1390 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:21.458317 kernel: audit: type=1327 audit(1734099316.748:85): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:15:21.458357 kernel: audit: type=1400 audit(1734099316.756:86): avc: denied { associate } for pid=1407 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:15:21.458392 kernel: audit: type=1300 audit(1734099316.756:86): arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145985 a2=1ed a3=0 items=2 ppid=1390 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:21.458424 kernel: audit: type=1307 audit(1734099316.756:86): cwd="/" Dec 13 14:15:21.458456 kernel: audit: type=1302 audit(1734099316.756:86): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:15:21.458486 kernel: audit: type=1302 audit(1734099316.756:86): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:15:21.458524 kernel: audit: type=1327 audit(1734099316.756:86): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:15:21.458564 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:15:21.458611 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:15:21.458646 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:15:21.458681 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:15:21.458719 kernel: audit: type=1334 audit(1734099321.013:87): prog-id=12 op=LOAD Dec 13 14:15:21.458751 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:15:21.458787 systemd[1]: Stopped iscsiuio.service. Dec 13 14:15:21.458825 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:15:21.458862 systemd[1]: Stopped iscsid.service. Dec 13 14:15:21.458905 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:15:21.458954 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:15:21.458991 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:15:21.459024 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:15:21.459064 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:15:21.459102 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 14:15:21.465093 systemd[1]: Created slice system-getty.slice. Dec 13 14:15:21.465236 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:15:21.465293 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:15:21.465340 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:15:21.465382 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:15:21.465420 systemd[1]: Created slice user.slice. Dec 13 14:15:21.465451 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:15:21.465482 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:15:21.465515 systemd[1]: Set up automount boot.automount. Dec 13 14:15:21.465545 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:15:21.465580 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:15:21.465611 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:15:21.465643 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:15:21.465674 systemd[1]: Reached target integritysetup.target. Dec 13 14:15:21.465708 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:15:21.465740 systemd[1]: Reached target remote-fs.target. Dec 13 14:15:21.465770 systemd[1]: Reached target slices.target. Dec 13 14:15:21.465800 systemd[1]: Reached target swap.target. Dec 13 14:15:21.465831 systemd[1]: Reached target torcx.target. Dec 13 14:15:21.465861 systemd[1]: Reached target veritysetup.target. Dec 13 14:15:21.465896 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:15:21.465929 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:15:21.465961 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:15:21.465990 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:15:21.466042 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:15:21.466081 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:15:21.466306 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:15:21.466347 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:15:21.466380 systemd[1]: Mounting media.mount... Dec 13 14:15:21.466418 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:15:21.466449 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:15:21.466485 systemd[1]: Mounting tmp.mount... Dec 13 14:15:21.466519 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:15:21.466556 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:15:21.466590 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:15:21.466637 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:15:21.466670 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:15:21.466708 systemd[1]: Starting modprobe@drm.service... Dec 13 14:15:21.466747 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:15:21.466781 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:15:21.466815 systemd[1]: Starting modprobe@loop.service... Dec 13 14:15:21.466850 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:15:21.466890 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:15:21.466923 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:15:21.466958 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:15:21.466990 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:15:21.467030 systemd[1]: Stopped systemd-journald.service. Dec 13 14:15:21.467071 systemd[1]: Starting systemd-journald.service... Dec 13 14:15:21.467103 kernel: fuse: init (API version 7.34) Dec 13 14:15:21.467179 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:15:21.467222 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:15:21.467263 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:15:21.467306 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:15:21.467349 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:15:21.467389 systemd[1]: Stopped verity-setup.service. Dec 13 14:15:21.467437 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:15:21.467476 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:15:21.467511 systemd[1]: Mounted media.mount. Dec 13 14:15:21.467540 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:15:21.467570 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:15:21.467603 systemd[1]: Mounted tmp.mount. Dec 13 14:15:21.467635 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:15:21.467689 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:15:21.467724 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:15:21.467754 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:15:21.467785 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:15:21.467814 kernel: loop: module loaded Dec 13 14:15:21.467844 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:15:21.467876 systemd[1]: Finished modprobe@drm.service. Dec 13 14:15:21.467908 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:15:21.467942 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:15:21.467972 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:15:21.468012 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:15:21.468042 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:15:21.468073 systemd[1]: Finished modprobe@loop.service. Dec 13 14:15:21.468125 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:15:21.468166 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:15:21.468206 systemd-journald[1485]: Journal started Dec 13 14:15:21.468315 systemd-journald[1485]: Runtime Journal (/run/log/journal/ec256fc88df64424ee23ec7962e3eddf) is 8.0M, max 75.4M, 67.4M free. Dec 13 14:15:16.352000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:15:16.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:15:16.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:15:16.534000 audit: BPF prog-id=10 op=LOAD Dec 13 14:15:16.534000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:15:16.534000 audit: BPF prog-id=11 op=LOAD Dec 13 14:15:16.534000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:15:16.748000 audit[1407]: AVC avc: denied { associate } for pid=1407 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:15:16.748000 audit[1407]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458ac a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1390 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:16.748000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:15:16.756000 audit[1407]: AVC avc: denied { associate } for pid=1407 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:15:16.756000 audit[1407]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145985 a2=1ed a3=0 items=2 ppid=1390 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:16.756000 audit: CWD cwd="/" Dec 13 14:15:21.473729 systemd[1]: Started systemd-journald.service. Dec 13 14:15:16.756000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:15:16.756000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:15:16.756000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:15:21.013000 audit: BPF prog-id=12 op=LOAD Dec 13 14:15:21.013000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:15:21.015000 audit: BPF prog-id=13 op=LOAD Dec 13 14:15:21.015000 audit: BPF prog-id=14 op=LOAD Dec 13 14:15:21.015000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:15:21.015000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:15:21.019000 audit: BPF prog-id=15 op=LOAD Dec 13 14:15:21.019000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:15:21.019000 audit: BPF prog-id=16 op=LOAD Dec 13 14:15:21.019000 audit: BPF prog-id=17 op=LOAD Dec 13 14:15:21.019000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:15:21.019000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:15:21.022000 audit: BPF prog-id=18 op=LOAD Dec 13 14:15:21.022000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:15:21.022000 audit: BPF prog-id=19 op=LOAD Dec 13 14:15:21.022000 audit: BPF prog-id=20 op=LOAD Dec 13 14:15:21.022000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:15:21.022000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:15:21.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.034000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:15:21.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.317000 audit: BPF prog-id=21 op=LOAD Dec 13 14:15:21.317000 audit: BPF prog-id=22 op=LOAD Dec 13 14:15:21.317000 audit: BPF prog-id=23 op=LOAD Dec 13 14:15:21.317000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:15:21.317000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:15:21.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.447000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:15:21.447000 audit[1485]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=5 a1=ffffce7f6c60 a2=4000 a3=1 items=0 ppid=1 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:21.447000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:15:21.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:16.744635 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T14:15:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:15:21.011366 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:15:16.745820 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T14:15:16Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:15:21.025306 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:15:16.745875 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T14:15:16Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:15:21.482571 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:15:16.745951 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T14:15:16Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:15:21.485068 systemd[1]: Reached target network-pre.target. Dec 13 14:15:16.745978 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T14:15:16Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:15:16.746052 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T14:15:16Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:15:16.746087 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T14:15:16Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:15:21.490055 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:15:16.746587 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T14:15:16Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:15:21.494510 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:15:16.746686 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T14:15:16Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:15:21.496193 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:15:16.746725 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T14:15:16Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:15:21.500094 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:15:16.748027 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T14:15:16Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:15:21.505639 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:15:16.748170 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T14:15:16Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:15:21.507843 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:15:16.748230 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T14:15:16Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:15:21.513485 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:15:16.748349 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T14:15:16Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:15:21.516246 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:15:16.748406 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T14:15:16Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:15:16.748447 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T14:15:16Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:15:20.029747 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T14:15:20Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:15:20.030359 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T14:15:20Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:15:20.030687 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T14:15:20Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:15:20.031210 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T14:15:20Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:15:21.521537 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:15:20.031347 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T14:15:20Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:15:21.528333 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:15:20.031499 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T14:15:20Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:15:21.532007 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:15:21.557254 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:15:21.559539 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:15:21.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.577249 systemd-journald[1485]: Time spent on flushing to /var/log/journal/ec256fc88df64424ee23ec7962e3eddf is 92.851ms for 1147 entries. Dec 13 14:15:21.577249 systemd-journald[1485]: System Journal (/var/log/journal/ec256fc88df64424ee23ec7962e3eddf) is 8.0M, max 195.6M, 187.6M free. Dec 13 14:15:21.689855 systemd-journald[1485]: Received client request to flush runtime journal. Dec 13 14:15:21.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.613939 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:15:21.619471 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:15:21.629642 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:15:21.694390 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:15:21.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.739517 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:15:21.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.743818 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:15:21.760327 udevadm[1526]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:15:21.839636 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:15:21.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.845252 kernel: kauditd_printk_skb: 58 callbacks suppressed Dec 13 14:15:21.845408 kernel: audit: type=1130 audit(1734099321.840:144): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.853840 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:15:21.973002 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:15:21.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:21.983148 kernel: audit: type=1130 audit(1734099321.973:145): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:22.465147 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:15:22.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:22.469972 systemd[1]: Starting systemd-udevd.service... Dec 13 14:15:22.488394 kernel: audit: type=1130 audit(1734099322.465:146): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:22.488555 kernel: audit: type=1334 audit(1734099322.467:147): prog-id=24 op=LOAD Dec 13 14:15:22.488607 kernel: audit: type=1334 audit(1734099322.467:148): prog-id=25 op=LOAD Dec 13 14:15:22.488655 kernel: audit: type=1334 audit(1734099322.467:149): prog-id=7 op=UNLOAD Dec 13 14:15:22.488706 kernel: audit: type=1334 audit(1734099322.467:150): prog-id=8 op=UNLOAD Dec 13 14:15:22.467000 audit: BPF prog-id=24 op=LOAD Dec 13 14:15:22.467000 audit: BPF prog-id=25 op=LOAD Dec 13 14:15:22.467000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:15:22.467000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:15:22.527256 systemd-udevd[1529]: Using default interface naming scheme 'v252'. Dec 13 14:15:22.588726 systemd[1]: Started systemd-udevd.service. Dec 13 14:15:22.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:22.601479 kernel: audit: type=1130 audit(1734099322.589:151): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:22.601612 kernel: audit: type=1334 audit(1734099322.599:152): prog-id=26 op=LOAD Dec 13 14:15:22.599000 audit: BPF prog-id=26 op=LOAD Dec 13 14:15:22.603939 systemd[1]: Starting systemd-networkd.service... Dec 13 14:15:22.626185 kernel: audit: type=1334 audit(1734099322.619:153): prog-id=27 op=LOAD Dec 13 14:15:22.619000 audit: BPF prog-id=27 op=LOAD Dec 13 14:15:22.621000 audit: BPF prog-id=28 op=LOAD Dec 13 14:15:22.621000 audit: BPF prog-id=29 op=LOAD Dec 13 14:15:22.624608 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:15:22.716345 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:15:22.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:22.745202 systemd[1]: Started systemd-userdbd.service. Dec 13 14:15:22.753500 (udev-worker)[1542]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:15:22.947325 systemd-networkd[1536]: lo: Link UP Dec 13 14:15:22.947352 systemd-networkd[1536]: lo: Gained carrier Dec 13 14:15:22.948588 systemd-networkd[1536]: Enumeration completed Dec 13 14:15:22.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:22.948777 systemd[1]: Started systemd-networkd.service. Dec 13 14:15:22.951258 systemd-networkd[1536]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:15:22.953631 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:15:22.961202 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:15:22.967004 systemd-networkd[1536]: eth0: Link UP Dec 13 14:15:22.967348 systemd-networkd[1536]: eth0: Gained carrier Dec 13 14:15:22.980424 systemd-networkd[1536]: eth0: DHCPv4 address 172.31.24.217/20, gateway 172.31.16.1 acquired from 172.31.16.1 Dec 13 14:15:23.032217 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1533) Dec 13 14:15:23.151748 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:15:23.154158 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:15:23.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:23.158049 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:15:23.221920 lvm[1648]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:15:23.259030 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:15:23.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:23.261077 systemd[1]: Reached target cryptsetup.target. Dec 13 14:15:23.265393 systemd[1]: Starting lvm2-activation.service... Dec 13 14:15:23.274481 lvm[1649]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:15:23.316142 systemd[1]: Finished lvm2-activation.service. Dec 13 14:15:23.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:23.318152 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:15:23.319918 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:15:23.319972 systemd[1]: Reached target local-fs.target. Dec 13 14:15:23.321902 systemd[1]: Reached target machines.target. Dec 13 14:15:23.326050 systemd[1]: Starting ldconfig.service... Dec 13 14:15:23.328874 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:15:23.329054 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:23.331763 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:15:23.336542 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:15:23.342433 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:15:23.346999 systemd[1]: Starting systemd-sysext.service... Dec 13 14:15:23.356831 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1651 (bootctl) Dec 13 14:15:23.359618 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:15:23.392204 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:15:23.404417 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:15:23.404862 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:15:23.437231 kernel: loop0: detected capacity change from 0 to 194096 Dec 13 14:15:23.444817 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:15:23.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:23.532677 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:15:23.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:23.535682 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:15:23.543231 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:15:23.549902 systemd-fsck[1661]: fsck.fat 4.2 (2021-01-31) Dec 13 14:15:23.549902 systemd-fsck[1661]: /dev/nvme0n1p1: 236 files, 117175/258078 clusters Dec 13 14:15:23.557387 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:15:23.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:23.562497 systemd[1]: Mounting boot.mount... Dec 13 14:15:23.575155 kernel: loop1: detected capacity change from 0 to 194096 Dec 13 14:15:23.590276 systemd[1]: Mounted boot.mount. Dec 13 14:15:23.612005 (sd-sysext)[1665]: Using extensions 'kubernetes'. Dec 13 14:15:23.612967 (sd-sysext)[1665]: Merged extensions into '/usr'. Dec 13 14:15:23.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:23.626753 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:15:23.662467 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:15:23.664855 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:15:23.668425 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:15:23.677430 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:15:23.682925 systemd[1]: Starting modprobe@loop.service... Dec 13 14:15:23.685424 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:15:23.685900 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:23.693312 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:15:23.696148 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:15:23.696495 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:15:23.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:23.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:23.699472 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:15:23.699899 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:15:23.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:23.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:23.703386 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:15:23.703794 systemd[1]: Finished modprobe@loop.service. Dec 13 14:15:23.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:23.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:23.706844 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:15:23.707053 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:15:23.709201 systemd[1]: Finished systemd-sysext.service. Dec 13 14:15:23.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:23.713957 systemd[1]: Starting ensure-sysext.service... Dec 13 14:15:23.718782 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:15:23.732938 systemd[1]: Reloading. Dec 13 14:15:23.760899 systemd-tmpfiles[1683]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:15:23.771757 systemd-tmpfiles[1683]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:15:23.777703 systemd-tmpfiles[1683]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:15:23.931941 /usr/lib/systemd/system-generators/torcx-generator[1702]: time="2024-12-13T14:15:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:15:23.933803 /usr/lib/systemd/system-generators/torcx-generator[1702]: time="2024-12-13T14:15:23Z" level=info msg="torcx already run" Dec 13 14:15:24.149581 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:15:24.149622 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:15:24.194903 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:15:24.351000 audit: BPF prog-id=30 op=LOAD Dec 13 14:15:24.351000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:15:24.354000 audit: BPF prog-id=31 op=LOAD Dec 13 14:15:24.355000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:15:24.355000 audit: BPF prog-id=32 op=LOAD Dec 13 14:15:24.355000 audit: BPF prog-id=33 op=LOAD Dec 13 14:15:24.355000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:15:24.355000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:15:24.365000 audit: BPF prog-id=34 op=LOAD Dec 13 14:15:24.365000 audit: BPF prog-id=35 op=LOAD Dec 13 14:15:24.365000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:15:24.365000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:15:24.366000 audit: BPF prog-id=36 op=LOAD Dec 13 14:15:24.366000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:15:24.367000 audit: BPF prog-id=37 op=LOAD Dec 13 14:15:24.367000 audit: BPF prog-id=38 op=LOAD Dec 13 14:15:24.367000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:15:24.367000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:15:24.375978 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:15:24.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:24.390240 systemd[1]: Starting audit-rules.service... Dec 13 14:15:24.396470 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:15:24.402938 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:15:24.408000 audit: BPF prog-id=39 op=LOAD Dec 13 14:15:24.413001 systemd[1]: Starting systemd-resolved.service... Dec 13 14:15:24.417000 audit: BPF prog-id=40 op=LOAD Dec 13 14:15:24.421820 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:15:24.429400 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:15:24.439626 systemd-networkd[1536]: eth0: Gained IPv6LL Dec 13 14:15:24.440285 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:15:24.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:24.448778 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:15:24.452291 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:15:24.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:24.458796 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:15:24.463196 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:15:24.468418 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:15:24.474757 systemd[1]: Starting modprobe@loop.service... Dec 13 14:15:24.476520 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:15:24.476884 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:24.477286 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:15:24.482668 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:15:24.483073 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:15:24.483459 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:24.483791 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:15:24.491267 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:15:24.495473 systemd[1]: Starting modprobe@drm.service... Dec 13 14:15:24.497417 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:15:24.497835 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:24.498229 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:15:24.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:24.502890 systemd[1]: Finished ensure-sysext.service. Dec 13 14:15:24.505539 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:15:24.505870 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:15:24.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:24.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:24.511313 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:15:24.511658 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:15:24.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:24.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:24.513703 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:15:24.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:24.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:24.524973 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:15:24.525358 systemd[1]: Finished modprobe@drm.service. Dec 13 14:15:24.537000 audit[1765]: SYSTEM_BOOT pid=1765 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:15:24.538726 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:15:24.539057 systemd[1]: Finished modprobe@loop.service. Dec 13 14:15:24.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:24.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:24.544213 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:15:24.546966 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:15:24.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:24.582380 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:15:24.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:24.656000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:15:24.656000 audit[1783]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe2b80f40 a2=420 a3=0 items=0 ppid=1759 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:24.656000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:15:24.659301 augenrules[1783]: No rules Dec 13 14:15:24.661391 systemd[1]: Finished audit-rules.service. Dec 13 14:15:24.673380 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:15:24.675475 systemd[1]: Reached target time-set.target. Dec 13 14:15:24.703614 ldconfig[1650]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:15:24.716058 systemd[1]: Finished ldconfig.service. Dec 13 14:15:24.720396 systemd[1]: Starting systemd-update-done.service... Dec 13 14:15:24.736855 systemd-resolved[1763]: Positive Trust Anchors: Dec 13 14:15:24.737596 systemd-resolved[1763]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:15:24.737808 systemd-resolved[1763]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:15:24.741312 systemd[1]: Finished systemd-update-done.service. Dec 13 14:15:24.794154 systemd-resolved[1763]: Defaulting to hostname 'linux'. Dec 13 14:15:24.797796 systemd[1]: Started systemd-resolved.service. Dec 13 14:15:24.799800 systemd[1]: Reached target network.target. Dec 13 14:15:24.801587 systemd[1]: Reached target network-online.target. Dec 13 14:15:24.803453 systemd[1]: Reached target nss-lookup.target. Dec 13 14:15:24.805306 systemd[1]: Reached target sysinit.target. Dec 13 14:15:24.807571 systemd[1]: Started motdgen.path. Dec 13 14:15:24.809627 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:15:24.812748 systemd[1]: Started logrotate.timer. Dec 13 14:15:24.814686 systemd[1]: Started mdadm.timer. Dec 13 14:15:24.816300 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:15:24.818535 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:15:24.818603 systemd[1]: Reached target paths.target. Dec 13 14:15:24.821021 systemd[1]: Reached target timers.target. Dec 13 14:15:24.823359 systemd[1]: Listening on dbus.socket. Dec 13 14:15:24.828481 systemd[1]: Starting docker.socket... Dec 13 14:15:24.837297 systemd[1]: Listening on sshd.socket. Dec 13 14:15:24.839454 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:24.841099 systemd[1]: Listening on docker.socket. Dec 13 14:15:24.843357 systemd[1]: Reached target sockets.target. Dec 13 14:15:24.845596 systemd[1]: Reached target basic.target. Dec 13 14:15:24.847907 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:15:24.848281 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:15:24.851616 systemd[1]: Started amazon-ssm-agent.service. Dec 13 14:15:24.857492 systemd[1]: Starting containerd.service... Dec 13 14:15:24.865266 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 14:15:24.877798 systemd[1]: Starting dbus.service... Dec 13 14:15:24.883391 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:15:25.031445 jq[1796]: false Dec 13 14:15:24.900561 systemd[1]: Starting extend-filesystems.service... Dec 13 14:15:24.902335 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:15:24.905631 systemd[1]: Starting kubelet.service... Dec 13 14:15:24.910483 systemd[1]: Starting motdgen.service... Dec 13 14:15:24.917541 systemd[1]: Started nvidia.service. Dec 13 14:15:24.922273 systemd[1]: Starting prepare-helm.service... Dec 13 14:15:24.928572 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:15:24.934568 systemd[1]: Starting sshd-keygen.service... Dec 13 14:15:24.948463 systemd[1]: Starting systemd-logind.service... Dec 13 14:15:24.950147 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:25.128040 jq[1808]: true Dec 13 14:15:24.950376 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:15:24.953164 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:15:25.137882 tar[1813]: linux-arm64/helm Dec 13 14:15:24.953438 systemd-timesyncd[1764]: Contacted time server 72.30.35.89:123 (0.flatcar.pool.ntp.org). Dec 13 14:15:24.953548 systemd-timesyncd[1764]: Initial clock synchronization to Fri 2024-12-13 14:15:24.685027 UTC. Dec 13 14:15:24.957165 systemd[1]: Starting update-engine.service... Dec 13 14:15:24.962447 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:15:25.051225 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:15:25.051629 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:15:25.102760 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:15:25.103201 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:15:25.192554 dbus-daemon[1795]: [system] SELinux support is enabled Dec 13 14:15:25.193853 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:15:25.194222 systemd[1]: Finished motdgen.service. Dec 13 14:15:25.196670 systemd[1]: Started dbus.service. Dec 13 14:15:25.201923 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:15:25.201993 systemd[1]: Reached target system-config.target. Dec 13 14:15:25.203931 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:15:25.203992 systemd[1]: Reached target user-config.target. Dec 13 14:15:25.205775 jq[1827]: true Dec 13 14:15:25.231360 dbus-daemon[1795]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1536 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 14:15:25.238338 systemd[1]: Starting systemd-hostnamed.service... Dec 13 14:15:25.277163 extend-filesystems[1798]: Found loop1 Dec 13 14:15:25.277163 extend-filesystems[1798]: Found nvme0n1 Dec 13 14:15:25.277163 extend-filesystems[1798]: Found nvme0n1p1 Dec 13 14:15:25.277163 extend-filesystems[1798]: Found nvme0n1p2 Dec 13 14:15:25.277163 extend-filesystems[1798]: Found nvme0n1p3 Dec 13 14:15:25.277163 extend-filesystems[1798]: Found usr Dec 13 14:15:25.277163 extend-filesystems[1798]: Found nvme0n1p4 Dec 13 14:15:25.277163 extend-filesystems[1798]: Found nvme0n1p6 Dec 13 14:15:25.277163 extend-filesystems[1798]: Found nvme0n1p7 Dec 13 14:15:25.277163 extend-filesystems[1798]: Found nvme0n1p9 Dec 13 14:15:25.277163 extend-filesystems[1798]: Checking size of /dev/nvme0n1p9 Dec 13 14:15:25.306711 amazon-ssm-agent[1792]: 2024/12/13 14:15:25 Failed to load instance info from vault. RegistrationKey does not exist. Dec 13 14:15:25.316139 amazon-ssm-agent[1792]: Initializing new seelog logger Dec 13 14:15:25.316139 amazon-ssm-agent[1792]: New Seelog Logger Creation Complete Dec 13 14:15:25.316139 amazon-ssm-agent[1792]: 2024/12/13 14:15:25 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Dec 13 14:15:25.316139 amazon-ssm-agent[1792]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Dec 13 14:15:25.316139 amazon-ssm-agent[1792]: 2024/12/13 14:15:25 processing appconfig overrides Dec 13 14:15:25.342219 update_engine[1807]: I1213 14:15:25.339385 1807 main.cc:92] Flatcar Update Engine starting Dec 13 14:15:25.359035 systemd[1]: Started update-engine.service. Dec 13 14:15:25.366149 update_engine[1807]: I1213 14:15:25.361622 1807 update_check_scheduler.cc:74] Next update check in 2m39s Dec 13 14:15:25.364227 systemd[1]: Started locksmithd.service. Dec 13 14:15:25.367864 extend-filesystems[1798]: Resized partition /dev/nvme0n1p9 Dec 13 14:15:25.379474 extend-filesystems[1862]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:15:25.401149 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Dec 13 14:15:25.487192 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Dec 13 14:15:25.520792 extend-filesystems[1862]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Dec 13 14:15:25.520792 extend-filesystems[1862]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 14:15:25.520792 extend-filesystems[1862]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Dec 13 14:15:25.529644 extend-filesystems[1798]: Resized filesystem in /dev/nvme0n1p9 Dec 13 14:15:25.539887 env[1824]: time="2024-12-13T14:15:25.532594281Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:15:25.531903 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:15:25.541826 bash[1866]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:15:25.532618 systemd[1]: Finished extend-filesystems.service. Dec 13 14:15:25.537451 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:15:25.664757 systemd[1]: nvidia.service: Deactivated successfully. Dec 13 14:15:25.698853 systemd-logind[1805]: Watching system buttons on /dev/input/event0 (Power Button) Dec 13 14:15:25.701190 systemd-logind[1805]: Watching system buttons on /dev/input/event1 (Sleep Button) Dec 13 14:15:25.702735 systemd-logind[1805]: New seat seat0. Dec 13 14:15:25.713350 systemd[1]: Started systemd-logind.service. Dec 13 14:15:25.724506 env[1824]: time="2024-12-13T14:15:25.724344355Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:15:25.724770 env[1824]: time="2024-12-13T14:15:25.724712302Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:15:25.731651 env[1824]: time="2024-12-13T14:15:25.731557246Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:15:25.731651 env[1824]: time="2024-12-13T14:15:25.731641421Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:15:25.732296 env[1824]: time="2024-12-13T14:15:25.732214902Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:15:25.732296 env[1824]: time="2024-12-13T14:15:25.732279976Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:15:25.732516 env[1824]: time="2024-12-13T14:15:25.732327202Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:15:25.732516 env[1824]: time="2024-12-13T14:15:25.732354932Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:15:25.732623 env[1824]: time="2024-12-13T14:15:25.732575252Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:15:25.733199 env[1824]: time="2024-12-13T14:15:25.733139373Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:15:25.744876 env[1824]: time="2024-12-13T14:15:25.744796088Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:15:25.744876 env[1824]: time="2024-12-13T14:15:25.744865372Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:15:25.745260 env[1824]: time="2024-12-13T14:15:25.745038745Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:15:25.745260 env[1824]: time="2024-12-13T14:15:25.745065489Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:15:25.765876 env[1824]: time="2024-12-13T14:15:25.765785452Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:15:25.766031 env[1824]: time="2024-12-13T14:15:25.765978553Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:15:25.766094 env[1824]: time="2024-12-13T14:15:25.766038014Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:15:25.766315 env[1824]: time="2024-12-13T14:15:25.766150070Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:15:25.766385 env[1824]: time="2024-12-13T14:15:25.766315801Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:15:25.766441 env[1824]: time="2024-12-13T14:15:25.766375853Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:15:25.766441 env[1824]: time="2024-12-13T14:15:25.766408907Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:15:25.767126 env[1824]: time="2024-12-13T14:15:25.767053318Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:15:25.767272 env[1824]: time="2024-12-13T14:15:25.767157802Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:15:25.767272 env[1824]: time="2024-12-13T14:15:25.767192142Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:15:25.767272 env[1824]: time="2024-12-13T14:15:25.767249133Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:15:25.767421 env[1824]: time="2024-12-13T14:15:25.767306263Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:15:25.767654 env[1824]: time="2024-12-13T14:15:25.767600693Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:15:25.767914 env[1824]: time="2024-12-13T14:15:25.767855354Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:15:25.770254 env[1824]: time="2024-12-13T14:15:25.770188220Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:15:25.770395 env[1824]: time="2024-12-13T14:15:25.770313429Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:15:25.770713 env[1824]: time="2024-12-13T14:15:25.770661451Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:15:25.771317 env[1824]: time="2024-12-13T14:15:25.770866497Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:15:25.771653 env[1824]: time="2024-12-13T14:15:25.771606358Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:15:25.771756 env[1824]: time="2024-12-13T14:15:25.771673114Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:15:25.772000 env[1824]: time="2024-12-13T14:15:25.771704497Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:15:25.772073 env[1824]: time="2024-12-13T14:15:25.772010049Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:15:25.772418 env[1824]: time="2024-12-13T14:15:25.772371501Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:15:25.772917 env[1824]: time="2024-12-13T14:15:25.772868042Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:15:25.772993 env[1824]: time="2024-12-13T14:15:25.772950049Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:15:25.773444 env[1824]: time="2024-12-13T14:15:25.772988101Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:15:25.782260 env[1824]: time="2024-12-13T14:15:25.782195938Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:15:25.782395 env[1824]: time="2024-12-13T14:15:25.782260931Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:15:25.782395 env[1824]: time="2024-12-13T14:15:25.782294657Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:15:25.782395 env[1824]: time="2024-12-13T14:15:25.782324718Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:15:25.782566 env[1824]: time="2024-12-13T14:15:25.782387728Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:15:25.782566 env[1824]: time="2024-12-13T14:15:25.782416907Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:15:25.782566 env[1824]: time="2024-12-13T14:15:25.782451410Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:15:25.782566 env[1824]: time="2024-12-13T14:15:25.782516207Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:15:25.783341 env[1824]: time="2024-12-13T14:15:25.783228082Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:15:25.785174 env[1824]: time="2024-12-13T14:15:25.783348489Z" level=info msg="Connect containerd service" Dec 13 14:15:25.785174 env[1824]: time="2024-12-13T14:15:25.783408831Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:15:25.793858 env[1824]: time="2024-12-13T14:15:25.792814001Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:15:25.793858 env[1824]: time="2024-12-13T14:15:25.793341845Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:15:25.793858 env[1824]: time="2024-12-13T14:15:25.793435380Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:15:25.793858 env[1824]: time="2024-12-13T14:15:25.793528648Z" level=info msg="containerd successfully booted in 0.300185s" Dec 13 14:15:25.793657 systemd[1]: Started containerd.service. Dec 13 14:15:25.803790 env[1824]: time="2024-12-13T14:15:25.803642075Z" level=info msg="Start subscribing containerd event" Dec 13 14:15:25.803932 env[1824]: time="2024-12-13T14:15:25.803826791Z" level=info msg="Start recovering state" Dec 13 14:15:25.803991 env[1824]: time="2024-12-13T14:15:25.803966751Z" level=info msg="Start event monitor" Dec 13 14:15:25.804047 env[1824]: time="2024-12-13T14:15:25.804008920Z" level=info msg="Start snapshots syncer" Dec 13 14:15:25.804047 env[1824]: time="2024-12-13T14:15:25.804034041Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:15:25.804226 env[1824]: time="2024-12-13T14:15:25.804185228Z" level=info msg="Start streaming server" Dec 13 14:15:25.843527 dbus-daemon[1795]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 14:15:25.843808 systemd[1]: Started systemd-hostnamed.service. Dec 13 14:15:25.848129 dbus-daemon[1795]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1842 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 14:15:25.852932 systemd[1]: Starting polkit.service... Dec 13 14:15:25.895402 polkitd[1890]: Started polkitd version 121 Dec 13 14:15:25.923561 polkitd[1890]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 14:15:25.923770 polkitd[1890]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 14:15:25.928882 polkitd[1890]: Finished loading, compiling and executing 2 rules Dec 13 14:15:25.930039 dbus-daemon[1795]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 14:15:25.930325 systemd[1]: Started polkit.service. Dec 13 14:15:25.935600 polkitd[1890]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 14:15:25.980604 systemd-hostnamed[1842]: Hostname set to (transient) Dec 13 14:15:25.980788 systemd-resolved[1763]: System hostname changed to 'ip-172-31-24-217'. Dec 13 14:15:26.197509 coreos-metadata[1794]: Dec 13 14:15:26.197 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Dec 13 14:15:26.204411 coreos-metadata[1794]: Dec 13 14:15:26.204 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Dec 13 14:15:26.205339 coreos-metadata[1794]: Dec 13 14:15:26.205 INFO Fetch successful Dec 13 14:15:26.205667 coreos-metadata[1794]: Dec 13 14:15:26.205 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 14:15:26.206587 coreos-metadata[1794]: Dec 13 14:15:26.206 INFO Fetch successful Dec 13 14:15:26.212260 unknown[1794]: wrote ssh authorized keys file for user: core Dec 13 14:15:26.240971 update-ssh-keys[1922]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:15:26.246689 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 14:15:26.416503 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO Create new startup processor Dec 13 14:15:26.417055 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [LongRunningPluginsManager] registered plugins: {} Dec 13 14:15:26.417055 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO Initializing bookkeeping folders Dec 13 14:15:26.417055 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO removing the completed state files Dec 13 14:15:26.417055 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO Initializing bookkeeping folders for long running plugins Dec 13 14:15:26.417055 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Dec 13 14:15:26.417055 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO Initializing healthcheck folders for long running plugins Dec 13 14:15:26.417055 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO Initializing locations for inventory plugin Dec 13 14:15:26.417055 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO Initializing default location for custom inventory Dec 13 14:15:26.417055 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO Initializing default location for file inventory Dec 13 14:15:26.417055 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO Initializing default location for role inventory Dec 13 14:15:26.417055 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO Init the cloudwatchlogs publisher Dec 13 14:15:26.417653 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [instanceID=i-03bc69b65512df00b] Successfully loaded platform independent plugin aws:configureDocker Dec 13 14:15:26.417653 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [instanceID=i-03bc69b65512df00b] Successfully loaded platform independent plugin aws:downloadContent Dec 13 14:15:26.417653 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [instanceID=i-03bc69b65512df00b] Successfully loaded platform independent plugin aws:refreshAssociation Dec 13 14:15:26.417653 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [instanceID=i-03bc69b65512df00b] Successfully loaded platform independent plugin aws:configurePackage Dec 13 14:15:26.417653 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [instanceID=i-03bc69b65512df00b] Successfully loaded platform independent plugin aws:runDocument Dec 13 14:15:26.417653 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [instanceID=i-03bc69b65512df00b] Successfully loaded platform independent plugin aws:softwareInventory Dec 13 14:15:26.417653 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [instanceID=i-03bc69b65512df00b] Successfully loaded platform independent plugin aws:runPowerShellScript Dec 13 14:15:26.417653 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [instanceID=i-03bc69b65512df00b] Successfully loaded platform independent plugin aws:updateSsmAgent Dec 13 14:15:26.417653 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [instanceID=i-03bc69b65512df00b] Successfully loaded platform independent plugin aws:runDockerAction Dec 13 14:15:26.417653 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [instanceID=i-03bc69b65512df00b] Successfully loaded platform dependent plugin aws:runShellScript Dec 13 14:15:26.417653 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Dec 13 14:15:26.417653 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO OS: linux, Arch: arm64 Dec 13 14:15:26.420174 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [HealthCheck] HealthCheck reporting agent health. Dec 13 14:15:26.469783 amazon-ssm-agent[1792]: datastore file /var/lib/amazon/ssm/i-03bc69b65512df00b/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Dec 13 14:15:26.525221 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [OfflineService] Starting document processing engine... Dec 13 14:15:26.620575 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [OfflineService] [EngineProcessor] Starting Dec 13 14:15:26.715164 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [OfflineService] [EngineProcessor] Initial processing Dec 13 14:15:26.809856 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [OfflineService] Starting message polling Dec 13 14:15:26.904856 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [OfflineService] Starting send replies to MDS Dec 13 14:15:27.000598 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [MessagingDeliveryService] Starting document processing engine... Dec 13 14:15:27.096400 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [MessagingDeliveryService] [EngineProcessor] Starting Dec 13 14:15:27.178397 tar[1813]: linux-arm64/LICENSE Dec 13 14:15:27.179178 tar[1813]: linux-arm64/README.md Dec 13 14:15:27.190015 systemd[1]: Finished prepare-helm.service. Dec 13 14:15:27.193967 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Dec 13 14:15:27.289432 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [MessagingDeliveryService] Starting message polling Dec 13 14:15:27.385566 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [MessagingDeliveryService] Starting send replies to MDS Dec 13 14:15:27.421353 locksmithd[1860]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:15:27.481556 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [instanceID=i-03bc69b65512df00b] Starting association polling Dec 13 14:15:27.577871 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Dec 13 14:15:27.674741 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [MessagingDeliveryService] [Association] Launching response handler Dec 13 14:15:27.771343 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Dec 13 14:15:27.855635 systemd[1]: Started kubelet.service. Dec 13 14:15:27.868294 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Dec 13 14:15:27.965482 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Dec 13 14:15:28.057671 sshd_keygen[1825]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:15:28.062669 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [MessageGatewayService] Starting session document processing engine... Dec 13 14:15:28.096943 systemd[1]: Finished sshd-keygen.service. Dec 13 14:15:28.101552 systemd[1]: Starting issuegen.service... Dec 13 14:15:28.114542 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:15:28.114893 systemd[1]: Finished issuegen.service. Dec 13 14:15:28.119260 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:15:28.137622 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:15:28.142844 systemd[1]: Started getty@tty1.service. Dec 13 14:15:28.147955 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:15:28.152025 systemd[1]: Reached target getty.target. Dec 13 14:15:28.154335 systemd[1]: Reached target multi-user.target. Dec 13 14:15:28.163716 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [MessageGatewayService] [EngineProcessor] Starting Dec 13 14:15:28.160061 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:15:28.181256 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:15:28.182271 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:15:28.184649 systemd[1]: Startup finished in 1.239s (kernel) + 8.595s (initrd) + 11.989s (userspace) = 21.824s. Dec 13 14:15:28.259080 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Dec 13 14:15:28.356824 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-03bc69b65512df00b, requestId: a6764ab5-23d3-469c-b16e-35c192706252 Dec 13 14:15:28.454885 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [MessageGatewayService] listening reply. Dec 13 14:15:28.553300 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [LongRunningPluginsManager] starting long running plugin manager Dec 13 14:15:28.652325 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [StartupProcessor] Executing startup processor tasks Dec 13 14:15:28.751068 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Dec 13 14:15:28.850084 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Dec 13 14:15:28.948799 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Dec 13 14:15:29.047889 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.6 Dec 13 14:15:29.147204 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Dec 13 14:15:29.243003 kubelet[2005]: E1213 14:15:29.242914 2005 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:15:29.247181 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-03bc69b65512df00b?role=subscribe&stream=input Dec 13 14:15:29.247219 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:15:29.247607 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:15:29.248208 systemd[1]: kubelet.service: Consumed 1.573s CPU time. Dec 13 14:15:29.346576 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-03bc69b65512df00b?role=subscribe&stream=input Dec 13 14:15:29.446614 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [MessageGatewayService] Starting receiving message from control channel Dec 13 14:15:29.546548 amazon-ssm-agent[1792]: 2024-12-13 14:15:26 INFO [MessageGatewayService] [EngineProcessor] Initial processing Dec 13 14:15:29.646855 amazon-ssm-agent[1792]: 2024-12-13 14:15:28 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Dec 13 14:15:33.888415 systemd[1]: Created slice system-sshd.slice. Dec 13 14:15:33.891071 systemd[1]: Started sshd@0-172.31.24.217:22-139.178.89.65:52108.service. Dec 13 14:15:34.182050 sshd[2026]: Accepted publickey for core from 139.178.89.65 port 52108 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:34.189054 sshd[2026]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:34.219454 systemd-logind[1805]: New session 1 of user core. Dec 13 14:15:34.223773 systemd[1]: Created slice user-500.slice. Dec 13 14:15:34.227403 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:15:34.251780 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:15:34.255389 systemd[1]: Starting user@500.service... Dec 13 14:15:34.264553 (systemd)[2029]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:34.483954 systemd[2029]: Queued start job for default target default.target. Dec 13 14:15:34.485582 systemd[2029]: Reached target paths.target. Dec 13 14:15:34.485825 systemd[2029]: Reached target sockets.target. Dec 13 14:15:34.486415 systemd[2029]: Reached target timers.target. Dec 13 14:15:34.486573 systemd[2029]: Reached target basic.target. Dec 13 14:15:34.486890 systemd[1]: Started user@500.service. Dec 13 14:15:34.487806 systemd[2029]: Reached target default.target. Dec 13 14:15:34.487896 systemd[2029]: Startup finished in 209ms. Dec 13 14:15:34.488852 systemd[1]: Started session-1.scope. Dec 13 14:15:34.638003 systemd[1]: Started sshd@1-172.31.24.217:22-139.178.89.65:52124.service. Dec 13 14:15:34.815756 sshd[2038]: Accepted publickey for core from 139.178.89.65 port 52124 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:34.818593 sshd[2038]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:34.827429 systemd-logind[1805]: New session 2 of user core. Dec 13 14:15:34.829889 systemd[1]: Started session-2.scope. Dec 13 14:15:34.968216 sshd[2038]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:34.975343 systemd[1]: sshd@1-172.31.24.217:22-139.178.89.65:52124.service: Deactivated successfully. Dec 13 14:15:34.976280 systemd-logind[1805]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:15:34.976889 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:15:34.979459 systemd-logind[1805]: Removed session 2. Dec 13 14:15:34.995854 systemd[1]: Started sshd@2-172.31.24.217:22-139.178.89.65:52126.service. Dec 13 14:15:35.170562 sshd[2044]: Accepted publickey for core from 139.178.89.65 port 52126 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:35.173987 sshd[2044]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:35.183676 systemd[1]: Started session-3.scope. Dec 13 14:15:35.184692 systemd-logind[1805]: New session 3 of user core. Dec 13 14:15:35.309089 sshd[2044]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:35.314397 systemd-logind[1805]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:15:35.314976 systemd[1]: sshd@2-172.31.24.217:22-139.178.89.65:52126.service: Deactivated successfully. Dec 13 14:15:35.316158 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:15:35.317706 systemd-logind[1805]: Removed session 3. Dec 13 14:15:35.336242 systemd[1]: Started sshd@3-172.31.24.217:22-139.178.89.65:52136.service. Dec 13 14:15:35.506012 sshd[2050]: Accepted publickey for core from 139.178.89.65 port 52136 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:35.508947 sshd[2050]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:35.521998 systemd-logind[1805]: New session 4 of user core. Dec 13 14:15:35.522528 systemd[1]: Started session-4.scope. Dec 13 14:15:35.660369 sshd[2050]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:35.664745 systemd-logind[1805]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:15:35.665397 systemd[1]: sshd@3-172.31.24.217:22-139.178.89.65:52136.service: Deactivated successfully. Dec 13 14:15:35.666723 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:15:35.668436 systemd-logind[1805]: Removed session 4. Dec 13 14:15:35.688827 systemd[1]: Started sshd@4-172.31.24.217:22-139.178.89.65:52144.service. Dec 13 14:15:35.859863 sshd[2056]: Accepted publickey for core from 139.178.89.65 port 52144 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:35.863159 sshd[2056]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:35.872488 systemd-logind[1805]: New session 5 of user core. Dec 13 14:15:35.873129 systemd[1]: Started session-5.scope. Dec 13 14:15:36.023441 sudo[2059]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:15:36.024589 sudo[2059]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:15:36.054385 dbus-daemon[1795]: avc: received setenforce notice (enforcing=1) Dec 13 14:15:36.057905 sudo[2059]: pam_unix(sudo:session): session closed for user root Dec 13 14:15:36.082287 sshd[2056]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:36.087687 systemd[1]: sshd@4-172.31.24.217:22-139.178.89.65:52144.service: Deactivated successfully. Dec 13 14:15:36.088982 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:15:36.091211 systemd-logind[1805]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:15:36.093629 systemd-logind[1805]: Removed session 5. Dec 13 14:15:36.109761 systemd[1]: Started sshd@5-172.31.24.217:22-139.178.89.65:52146.service. Dec 13 14:15:36.282087 sshd[2063]: Accepted publickey for core from 139.178.89.65 port 52146 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:36.285093 sshd[2063]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:36.294555 systemd-logind[1805]: New session 6 of user core. Dec 13 14:15:36.295534 systemd[1]: Started session-6.scope. Dec 13 14:15:36.406435 sudo[2067]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:15:36.407784 sudo[2067]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:15:36.414078 sudo[2067]: pam_unix(sudo:session): session closed for user root Dec 13 14:15:36.425689 sudo[2066]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:15:36.426385 sudo[2066]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:15:36.445992 systemd[1]: Stopping audit-rules.service... Dec 13 14:15:36.447000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:15:36.450757 kernel: kauditd_printk_skb: 56 callbacks suppressed Dec 13 14:15:36.450841 kernel: audit: type=1305 audit(1734099336.447:208): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:15:36.451391 auditctl[2070]: No rules Dec 13 14:15:36.452611 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:15:36.453012 systemd[1]: Stopped audit-rules.service. Dec 13 14:15:36.457337 systemd[1]: Starting audit-rules.service... Dec 13 14:15:36.469324 kernel: audit: type=1300 audit(1734099336.447:208): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcf4d3300 a2=420 a3=0 items=0 ppid=1 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:36.447000 audit[2070]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcf4d3300 a2=420 a3=0 items=0 ppid=1 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:36.447000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:15:36.472805 kernel: audit: type=1327 audit(1734099336.447:208): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:15:36.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:36.480364 kernel: audit: type=1131 audit(1734099336.449:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:36.495968 augenrules[2087]: No rules Dec 13 14:15:36.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:36.497778 systemd[1]: Finished audit-rules.service. Dec 13 14:15:36.499353 sudo[2066]: pam_unix(sudo:session): session closed for user root Dec 13 14:15:36.498000 audit[2066]: USER_END pid=2066 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:36.516173 kernel: audit: type=1130 audit(1734099336.497:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:36.516384 kernel: audit: type=1106 audit(1734099336.498:211): pid=2066 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:36.516447 kernel: audit: type=1104 audit(1734099336.498:212): pid=2066 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:36.498000 audit[2066]: CRED_DISP pid=2066 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:36.524865 sshd[2063]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:36.525000 audit[2063]: USER_END pid=2063 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:36.531219 systemd-logind[1805]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:15:36.532968 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:15:36.534238 systemd[1]: sshd@5-172.31.24.217:22-139.178.89.65:52146.service: Deactivated successfully. Dec 13 14:15:36.537446 systemd-logind[1805]: Removed session 6. Dec 13 14:15:36.526000 audit[2063]: CRED_DISP pid=2063 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:36.553555 kernel: audit: type=1106 audit(1734099336.525:213): pid=2063 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:36.553668 kernel: audit: type=1104 audit(1734099336.526:214): pid=2063 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:36.553715 kernel: audit: type=1131 audit(1734099336.532:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.24.217:22-139.178.89.65:52146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:36.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.24.217:22-139.178.89.65:52146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:36.557429 systemd[1]: Started sshd@6-172.31.24.217:22-139.178.89.65:52148.service. Dec 13 14:15:36.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.24.217:22-139.178.89.65:52148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:36.731000 audit[2093]: USER_ACCT pid=2093 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:36.735147 sshd[2093]: Accepted publickey for core from 139.178.89.65 port 52148 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:36.734000 audit[2093]: CRED_ACQ pid=2093 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:36.734000 audit[2093]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe61e76d0 a2=3 a3=1 items=0 ppid=1 pid=2093 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:36.734000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:15:36.736232 sshd[2093]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:36.745201 systemd-logind[1805]: New session 7 of user core. Dec 13 14:15:36.746270 systemd[1]: Started session-7.scope. Dec 13 14:15:36.757000 audit[2093]: USER_START pid=2093 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:36.761000 audit[2095]: CRED_ACQ pid=2095 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:36.857000 audit[2096]: USER_ACCT pid=2096 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:36.859348 sudo[2096]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:15:36.858000 audit[2096]: CRED_REFR pid=2096 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:36.860010 sudo[2096]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:15:36.863000 audit[2096]: USER_START pid=2096 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:36.915181 systemd[1]: Starting docker.service... Dec 13 14:15:36.992461 env[2106]: time="2024-12-13T14:15:36.991313112Z" level=info msg="Starting up" Dec 13 14:15:36.994578 env[2106]: time="2024-12-13T14:15:36.994530415Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:15:36.994745 env[2106]: time="2024-12-13T14:15:36.994715765Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:15:36.994873 env[2106]: time="2024-12-13T14:15:36.994840043Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:15:36.994979 env[2106]: time="2024-12-13T14:15:36.994952615Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:15:36.997643 env[2106]: time="2024-12-13T14:15:36.997595887Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:15:36.997845 env[2106]: time="2024-12-13T14:15:36.997816400Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:15:36.997979 env[2106]: time="2024-12-13T14:15:36.997948679Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:15:36.998085 env[2106]: time="2024-12-13T14:15:36.998059227Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:15:37.043733 env[2106]: time="2024-12-13T14:15:37.043676558Z" level=info msg="Loading containers: start." Dec 13 14:15:37.202000 audit[2138]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=2138 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.202000 audit[2138]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=fffff9f268c0 a2=0 a3=1 items=0 ppid=2106 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.202000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 14:15:37.208000 audit[2140]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2140 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.208000 audit[2140]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffd47c4a90 a2=0 a3=1 items=0 ppid=2106 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.208000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 14:15:37.213000 audit[2142]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=2142 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.213000 audit[2142]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffd7d7ad60 a2=0 a3=1 items=0 ppid=2106 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.213000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:15:37.218000 audit[2144]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=2144 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.218000 audit[2144]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffef004960 a2=0 a3=1 items=0 ppid=2106 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.218000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:15:37.235000 audit[2146]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2146 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.235000 audit[2146]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd76399f0 a2=0 a3=1 items=0 ppid=2106 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.235000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 14:15:37.272000 audit[2151]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=2151 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.272000 audit[2151]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc4b5a3f0 a2=0 a3=1 items=0 ppid=2106 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.272000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 14:15:37.286000 audit[2153]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=2153 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.286000 audit[2153]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd48fc310 a2=0 a3=1 items=0 ppid=2106 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.286000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 14:15:37.291000 audit[2155]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2155 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.291000 audit[2155]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffc59142b0 a2=0 a3=1 items=0 ppid=2106 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.291000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 14:15:37.296000 audit[2157]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2157 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.296000 audit[2157]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffc4049050 a2=0 a3=1 items=0 ppid=2106 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.296000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:15:37.312000 audit[2161]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2161 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.312000 audit[2161]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff1b36460 a2=0 a3=1 items=0 ppid=2106 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.312000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:15:37.320000 audit[2162]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2162 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.320000 audit[2162]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffe2221150 a2=0 a3=1 items=0 ppid=2106 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.320000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:15:37.360144 kernel: Initializing XFRM netlink socket Dec 13 14:15:37.425600 env[2106]: time="2024-12-13T14:15:37.425552755Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 14:15:37.428485 (udev-worker)[2118]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:15:37.482000 audit[2170]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2170 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.482000 audit[2170]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=fffff78cfc60 a2=0 a3=1 items=0 ppid=2106 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.482000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 14:15:37.504000 audit[2173]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2173 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.504000 audit[2173]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=fffff54f1ae0 a2=0 a3=1 items=0 ppid=2106 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.504000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 14:15:37.511000 audit[2176]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2176 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.511000 audit[2176]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff67fc420 a2=0 a3=1 items=0 ppid=2106 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.511000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 14:15:37.517000 audit[2178]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.517000 audit[2178]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff3f2c090 a2=0 a3=1 items=0 ppid=2106 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.517000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 14:15:37.523000 audit[2180]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2180 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.523000 audit[2180]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffce786620 a2=0 a3=1 items=0 ppid=2106 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.523000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 14:15:37.530000 audit[2182]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2182 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.530000 audit[2182]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffc9525ba0 a2=0 a3=1 items=0 ppid=2106 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.530000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 14:15:37.535000 audit[2184]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.535000 audit[2184]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffe83d7ed0 a2=0 a3=1 items=0 ppid=2106 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.535000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 14:15:37.563000 audit[2187]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2187 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.563000 audit[2187]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=fffffe771e20 a2=0 a3=1 items=0 ppid=2106 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.563000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 14:15:37.569000 audit[2189]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2189 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.569000 audit[2189]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffe620b430 a2=0 a3=1 items=0 ppid=2106 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.569000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:15:37.574000 audit[2191]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2191 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.574000 audit[2191]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffd2abade0 a2=0 a3=1 items=0 ppid=2106 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.574000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:15:37.579000 audit[2193]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.579000 audit[2193]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc5ebd230 a2=0 a3=1 items=0 ppid=2106 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.579000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 14:15:37.582351 systemd-networkd[1536]: docker0: Link UP Dec 13 14:15:37.602000 audit[2197]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2197 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.602000 audit[2197]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc224fe90 a2=0 a3=1 items=0 ppid=2106 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.602000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:15:37.610000 audit[2198]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:37.610000 audit[2198]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffd116f5e0 a2=0 a3=1 items=0 ppid=2106 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.610000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:15:37.612880 env[2106]: time="2024-12-13T14:15:37.612811417Z" level=info msg="Loading containers: done." Dec 13 14:15:37.647367 env[2106]: time="2024-12-13T14:15:37.647279582Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 14:15:37.647640 env[2106]: time="2024-12-13T14:15:37.647615029Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 14:15:37.647853 env[2106]: time="2024-12-13T14:15:37.647802419Z" level=info msg="Daemon has completed initialization" Dec 13 14:15:37.672094 systemd[1]: Started docker.service. Dec 13 14:15:37.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:37.689835 env[2106]: time="2024-12-13T14:15:37.689704998Z" level=info msg="API listen on /run/docker.sock" Dec 13 14:15:39.052524 env[1824]: time="2024-12-13T14:15:39.052436921Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\"" Dec 13 14:15:39.283662 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:15:39.284065 systemd[1]: Stopped kubelet.service. Dec 13 14:15:39.284242 systemd[1]: kubelet.service: Consumed 1.573s CPU time. Dec 13 14:15:39.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:39.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:39.287437 systemd[1]: Starting kubelet.service... Dec 13 14:15:39.641821 systemd[1]: Started kubelet.service. Dec 13 14:15:39.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:39.782862 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1888910693.mount: Deactivated successfully. Dec 13 14:15:39.796214 kubelet[2239]: E1213 14:15:39.796089 2239 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:15:39.808267 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:15:39.808648 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:15:39.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:15:42.429602 env[1824]: time="2024-12-13T14:15:42.429538151Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:42.435228 env[1824]: time="2024-12-13T14:15:42.435172104Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8202e87ffef091fe4f11dd113ff6f2ab16c70279775d224ddd8aa95e2dd0b966,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:42.438289 env[1824]: time="2024-12-13T14:15:42.438227101Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:42.443925 env[1824]: time="2024-12-13T14:15:42.443855290Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:f0e1b3de0c2e98e6c6abd73edf9d3b8e4d44460656cde0ebb92e2d9206961fcb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:42.445085 env[1824]: time="2024-12-13T14:15:42.444910108Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\" returns image reference \"sha256:8202e87ffef091fe4f11dd113ff6f2ab16c70279775d224ddd8aa95e2dd0b966\"" Dec 13 14:15:42.462198 env[1824]: time="2024-12-13T14:15:42.462091028Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\"" Dec 13 14:15:45.320917 env[1824]: time="2024-12-13T14:15:45.320824964Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:45.324299 env[1824]: time="2024-12-13T14:15:45.324191977Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b2191aa4d4d6ca9fbd7704b35401bfa6b0b90de75db22c425053e97fd5c8338,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:45.329461 env[1824]: time="2024-12-13T14:15:45.329370783Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:45.334028 env[1824]: time="2024-12-13T14:15:45.333963661Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:124f66b7e877eb5a80a40503057299bb60e6a5f2130905f4e3293dabf194c397,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:45.336190 env[1824]: time="2024-12-13T14:15:45.336098894Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\" returns image reference \"sha256:4b2191aa4d4d6ca9fbd7704b35401bfa6b0b90de75db22c425053e97fd5c8338\"" Dec 13 14:15:45.360982 env[1824]: time="2024-12-13T14:15:45.360781477Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\"" Dec 13 14:15:47.132782 env[1824]: time="2024-12-13T14:15:47.132719012Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:47.135599 env[1824]: time="2024-12-13T14:15:47.135542135Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d43326c1723208785a33cdc1507082792eb041ca0d789c103c90180e31f65ca8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:47.138983 env[1824]: time="2024-12-13T14:15:47.138929885Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:47.142269 env[1824]: time="2024-12-13T14:15:47.142205240Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c8bdeac2590c99c1a77e33995423ddb6633ff90a82a2aa455442e0a8079ef8c7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:47.144158 env[1824]: time="2024-12-13T14:15:47.144073028Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\" returns image reference \"sha256:d43326c1723208785a33cdc1507082792eb041ca0d789c103c90180e31f65ca8\"" Dec 13 14:15:47.159700 env[1824]: time="2024-12-13T14:15:47.159637382Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 14:15:48.608327 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2941739062.mount: Deactivated successfully. Dec 13 14:15:49.461285 env[1824]: time="2024-12-13T14:15:49.461211467Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:49.464201 env[1824]: time="2024-12-13T14:15:49.464085225Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4612aebc0675831aedbbde7cd56b85db91f1fdcf05ef923072961538ec497adb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:49.466664 env[1824]: time="2024-12-13T14:15:49.466600048Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:49.468922 env[1824]: time="2024-12-13T14:15:49.468840576Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:49.470374 env[1824]: time="2024-12-13T14:15:49.470309092Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:4612aebc0675831aedbbde7cd56b85db91f1fdcf05ef923072961538ec497adb\"" Dec 13 14:15:49.488213 env[1824]: time="2024-12-13T14:15:49.488154177Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 14:15:50.038948 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:15:50.041563 systemd[1]: Stopped kubelet.service. Dec 13 14:15:50.051784 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 14:15:50.051907 kernel: audit: type=1130 audit(1734099350.040:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:50.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:50.045929 systemd[1]: Starting kubelet.service... Dec 13 14:15:50.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:50.060994 kernel: audit: type=1131 audit(1734099350.040:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:50.128060 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount582989848.mount: Deactivated successfully. Dec 13 14:15:50.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:50.465828 systemd[1]: Started kubelet.service. Dec 13 14:15:50.477156 kernel: audit: type=1130 audit(1734099350.465:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:50.609058 kubelet[2271]: E1213 14:15:50.608970 2271 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:15:50.619949 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:15:50.620327 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:15:50.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:15:50.630133 kernel: audit: type=1131 audit(1734099350.619:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:15:52.039753 env[1824]: time="2024-12-13T14:15:52.039667049Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:52.119942 env[1824]: time="2024-12-13T14:15:52.119870021Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:52.197351 env[1824]: time="2024-12-13T14:15:52.197276939Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:52.221609 env[1824]: time="2024-12-13T14:15:52.221535925Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:52.223378 env[1824]: time="2024-12-13T14:15:52.223312153Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93\"" Dec 13 14:15:52.242005 env[1824]: time="2024-12-13T14:15:52.241952199Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 14:15:52.976825 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1150630576.mount: Deactivated successfully. Dec 13 14:15:52.991951 env[1824]: time="2024-12-13T14:15:52.991877802Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:52.997510 env[1824]: time="2024-12-13T14:15:52.997445236Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:53.004298 env[1824]: time="2024-12-13T14:15:53.004239434Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:53.012625 env[1824]: time="2024-12-13T14:15:53.012529714Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Dec 13 14:15:53.014741 env[1824]: time="2024-12-13T14:15:53.014017019Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:53.033491 env[1824]: time="2024-12-13T14:15:53.033418881Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" Dec 13 14:15:53.710775 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount410966174.mount: Deactivated successfully. Dec 13 14:15:56.004093 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 14:15:56.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:56.015176 kernel: audit: type=1131 audit(1734099356.003:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:56.029000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:15:56.035423 kernel: audit: type=1334 audit(1734099356.029:259): prog-id=46 op=UNLOAD Dec 13 14:15:56.035562 kernel: audit: type=1334 audit(1734099356.029:260): prog-id=45 op=UNLOAD Dec 13 14:15:56.029000 audit: BPF prog-id=45 op=UNLOAD Dec 13 14:15:56.029000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:15:56.038261 kernel: audit: type=1334 audit(1734099356.029:261): prog-id=44 op=UNLOAD Dec 13 14:15:57.979560 env[1824]: time="2024-12-13T14:15:57.979500847Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:57.985905 env[1824]: time="2024-12-13T14:15:57.985841665Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:014faa467e29798aeef733fe6d1a3b5e382688217b053ad23410e6cccd5d22fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:57.990240 env[1824]: time="2024-12-13T14:15:57.990179470Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:57.994353 env[1824]: time="2024-12-13T14:15:57.994290544Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:57.996250 env[1824]: time="2024-12-13T14:15:57.996200338Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:014faa467e29798aeef733fe6d1a3b5e382688217b053ad23410e6cccd5d22fd\"" Dec 13 14:15:58.849929 amazon-ssm-agent[1792]: 2024-12-13 14:15:58 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Dec 13 14:16:00.783625 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 14:16:00.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:00.784168 systemd[1]: Stopped kubelet.service. Dec 13 14:16:00.799893 systemd[1]: Starting kubelet.service... Dec 13 14:16:00.810937 kernel: audit: type=1130 audit(1734099360.783:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:00.811098 kernel: audit: type=1131 audit(1734099360.783:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:00.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:01.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:01.131001 systemd[1]: Started kubelet.service. Dec 13 14:16:01.142157 kernel: audit: type=1130 audit(1734099361.130:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:01.250789 kubelet[2353]: E1213 14:16:01.250703 2353 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:16:01.255027 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:16:01.255446 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:16:01.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:16:01.265158 kernel: audit: type=1131 audit(1734099361.254:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:16:06.244832 systemd[1]: Stopped kubelet.service. Dec 13 14:16:06.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:06.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:06.260670 kernel: audit: type=1130 audit(1734099366.244:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:06.260803 kernel: audit: type=1131 audit(1734099366.250:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:06.262299 systemd[1]: Starting kubelet.service... Dec 13 14:16:06.316804 systemd[1]: Reloading. Dec 13 14:16:06.566865 /usr/lib/systemd/system-generators/torcx-generator[2385]: time="2024-12-13T14:16:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:16:06.566940 /usr/lib/systemd/system-generators/torcx-generator[2385]: time="2024-12-13T14:16:06Z" level=info msg="torcx already run" Dec 13 14:16:06.785329 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:16:06.785600 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:16:06.829463 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:16:07.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.019415 kernel: audit: type=1400 audit(1734099367.004:268): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.019563 kernel: audit: type=1400 audit(1734099367.004:269): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.019630 kernel: audit: type=1400 audit(1734099367.004:270): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.033468 kernel: audit: type=1400 audit(1734099367.004:271): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.033592 kernel: audit: type=1400 audit(1734099367.004:272): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.047849 kernel: audit: type=1400 audit(1734099367.004:273): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.048051 kernel: audit: type=1400 audit(1734099367.004:274): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.057134 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:16:07.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.011000 audit: BPF prog-id=49 op=LOAD Dec 13 14:16:07.011000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:16:07.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.018000 audit: BPF prog-id=50 op=LOAD Dec 13 14:16:07.018000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:16:07.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.025000 audit: BPF prog-id=51 op=LOAD Dec 13 14:16:07.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.032000 audit: BPF prog-id=52 op=LOAD Dec 13 14:16:07.032000 audit: BPF prog-id=42 op=UNLOAD Dec 13 14:16:07.032000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:16:07.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.039000 audit: BPF prog-id=53 op=LOAD Dec 13 14:16:07.039000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:16:07.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.047000 audit: BPF prog-id=54 op=LOAD Dec 13 14:16:07.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.056000 audit: BPF prog-id=55 op=LOAD Dec 13 14:16:07.056000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:16:07.056000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:16:07.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.060000 audit: BPF prog-id=56 op=LOAD Dec 13 14:16:07.060000 audit: BPF prog-id=47 op=UNLOAD Dec 13 14:16:07.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.062000 audit: BPF prog-id=57 op=LOAD Dec 13 14:16:07.062000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:16:07.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.065000 audit: BPF prog-id=58 op=LOAD Dec 13 14:16:07.066000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:16:07.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.075000 audit: BPF prog-id=59 op=LOAD Dec 13 14:16:07.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.075000 audit: BPF prog-id=60 op=LOAD Dec 13 14:16:07.075000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:16:07.076000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:16:07.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.077000 audit: BPF prog-id=61 op=LOAD Dec 13 14:16:07.077000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:16:07.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.077000 audit: BPF prog-id=62 op=LOAD Dec 13 14:16:07.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:07.077000 audit: BPF prog-id=63 op=LOAD Dec 13 14:16:07.078000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:16:07.078000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:16:07.128614 systemd[1]: Started kubelet.service. Dec 13 14:16:07.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:07.141767 systemd[1]: Stopping kubelet.service... Dec 13 14:16:07.142657 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:16:07.143035 systemd[1]: Stopped kubelet.service. Dec 13 14:16:07.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:07.146748 systemd[1]: Starting kubelet.service... Dec 13 14:16:07.444932 systemd[1]: Started kubelet.service. Dec 13 14:16:07.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:07.538926 kubelet[2451]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:16:07.538926 kubelet[2451]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:16:07.538926 kubelet[2451]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:16:07.542829 kubelet[2451]: I1213 14:16:07.542693 2451 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:16:08.869747 kubelet[2451]: I1213 14:16:08.869664 2451 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 14:16:08.869747 kubelet[2451]: I1213 14:16:08.869725 2451 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:16:08.870494 kubelet[2451]: I1213 14:16:08.870090 2451 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 14:16:08.895059 kubelet[2451]: E1213 14:16:08.895015 2451 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.24.217:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.24.217:6443: connect: connection refused Dec 13 14:16:08.895683 kubelet[2451]: I1213 14:16:08.895639 2451 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:16:08.915367 kubelet[2451]: I1213 14:16:08.915301 2451 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:16:08.915944 kubelet[2451]: I1213 14:16:08.915871 2451 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:16:08.916269 kubelet[2451]: I1213 14:16:08.915931 2451 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-24-217","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:16:08.916483 kubelet[2451]: I1213 14:16:08.916300 2451 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:16:08.916483 kubelet[2451]: I1213 14:16:08.916327 2451 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:16:08.916627 kubelet[2451]: I1213 14:16:08.916545 2451 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:16:08.918378 kubelet[2451]: I1213 14:16:08.918320 2451 kubelet.go:400] "Attempting to sync node with API server" Dec 13 14:16:08.918378 kubelet[2451]: I1213 14:16:08.918368 2451 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:16:08.918557 kubelet[2451]: I1213 14:16:08.918460 2451 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:16:08.918557 kubelet[2451]: I1213 14:16:08.918510 2451 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:16:08.923145 kubelet[2451]: I1213 14:16:08.923057 2451 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:16:08.923628 kubelet[2451]: I1213 14:16:08.923567 2451 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:16:08.923891 kubelet[2451]: W1213 14:16:08.923717 2451 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:16:08.924999 kubelet[2451]: I1213 14:16:08.924934 2451 server.go:1264] "Started kubelet" Dec 13 14:16:08.925376 kubelet[2451]: W1213 14:16:08.925274 2451 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.24.217:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.24.217:6443: connect: connection refused Dec 13 14:16:08.925511 kubelet[2451]: E1213 14:16:08.925401 2451 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.24.217:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.24.217:6443: connect: connection refused Dec 13 14:16:08.925654 kubelet[2451]: W1213 14:16:08.925575 2451 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.24.217:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-24-217&limit=500&resourceVersion=0": dial tcp 172.31.24.217:6443: connect: connection refused Dec 13 14:16:08.925795 kubelet[2451]: E1213 14:16:08.925667 2451 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.24.217:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-24-217&limit=500&resourceVersion=0": dial tcp 172.31.24.217:6443: connect: connection refused Dec 13 14:16:08.944663 kubelet[2451]: I1213 14:16:08.944538 2451 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:16:08.945273 kubelet[2451]: I1213 14:16:08.945230 2451 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:16:08.945614 kubelet[2451]: I1213 14:16:08.945536 2451 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:16:08.961201 kubelet[2451]: E1213 14:16:08.960893 2451 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.24.217:6443/api/v1/namespaces/default/events\": dial tcp 172.31.24.217:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-24-217.1810c23039ff74b7 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-24-217,UID:ip-172-31-24-217,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-24-217,},FirstTimestamp:2024-12-13 14:16:08.924902583 +0000 UTC m=+1.467377839,LastTimestamp:2024-12-13 14:16:08.924902583 +0000 UTC m=+1.467377839,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-24-217,}" Dec 13 14:16:08.961000 audit[2451]: AVC avc: denied { mac_admin } for pid=2451 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:08.961000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:16:08.961000 audit[2451]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000a90d80 a1=4000bc9f98 a2=4000a90d50 a3=25 items=0 ppid=1 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:08.961000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:16:08.963628 kubelet[2451]: I1213 14:16:08.963567 2451 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:16:08.962000 audit[2451]: AVC avc: denied { mac_admin } for pid=2451 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:08.962000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:16:08.962000 audit[2451]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000bdd040 a1=4000bc9fb0 a2=4000a90e10 a3=25 items=0 ppid=1 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:08.962000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:16:08.964271 kubelet[2451]: I1213 14:16:08.963885 2451 server.go:455] "Adding debug handlers to kubelet server" Dec 13 14:16:08.964478 kubelet[2451]: I1213 14:16:08.964427 2451 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:16:08.964859 kubelet[2451]: I1213 14:16:08.964816 2451 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:16:08.967142 kubelet[2451]: I1213 14:16:08.967017 2451 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:16:08.968280 kubelet[2451]: I1213 14:16:08.968227 2451 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 14:16:08.970603 kubelet[2451]: I1213 14:16:08.970549 2451 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:16:08.972260 kubelet[2451]: E1213 14:16:08.971938 2451 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.24.217:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-24-217?timeout=10s\": dial tcp 172.31.24.217:6443: connect: connection refused" interval="200ms" Dec 13 14:16:08.972737 kubelet[2451]: I1213 14:16:08.972664 2451 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:16:08.973971 kubelet[2451]: W1213 14:16:08.973847 2451 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.24.217:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.24.217:6443: connect: connection refused Dec 13 14:16:08.976750 kubelet[2451]: E1213 14:16:08.976682 2451 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.24.217:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.24.217:6443: connect: connection refused Dec 13 14:16:08.979996 kubelet[2451]: I1213 14:16:08.979870 2451 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:16:08.979996 kubelet[2451]: I1213 14:16:08.979945 2451 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:16:08.981542 kubelet[2451]: E1213 14:16:08.981450 2451 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:16:08.986000 audit[2463]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:08.986000 audit[2463]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdfc11400 a2=0 a3=1 items=0 ppid=2451 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:08.986000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:16:08.996000 audit[2464]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:08.996000 audit[2464]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd97978b0 a2=0 a3=1 items=0 ppid=2451 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:08.996000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:16:09.012874 kubelet[2451]: I1213 14:16:09.012840 2451 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:16:09.013276 kubelet[2451]: I1213 14:16:09.013228 2451 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:16:09.013467 kubelet[2451]: I1213 14:16:09.013443 2451 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:16:09.013000 audit[2467]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2467 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:09.013000 audit[2467]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffbd2dd30 a2=0 a3=1 items=0 ppid=2451 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:09.013000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:16:09.017189 kubelet[2451]: I1213 14:16:09.017148 2451 policy_none.go:49] "None policy: Start" Dec 13 14:16:09.018700 kubelet[2451]: I1213 14:16:09.018666 2451 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:16:09.018912 kubelet[2451]: I1213 14:16:09.018891 2451 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:16:09.020000 audit[2469]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2469 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:09.020000 audit[2469]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd1689220 a2=0 a3=1 items=0 ppid=2451 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:09.020000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:16:09.035059 systemd[1]: Created slice kubepods.slice. Dec 13 14:16:09.049000 audit[2473]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2473 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:09.049000 audit[2473]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffcde77fa0 a2=0 a3=1 items=0 ppid=2451 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:09.049000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:16:09.051532 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:16:09.056751 kubelet[2451]: I1213 14:16:09.056549 2451 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:16:09.059809 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:16:09.060000 audit[2475]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2475 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:09.060000 audit[2475]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd9a07b90 a2=0 a3=1 items=0 ppid=2451 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:09.060000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:16:09.063489 kubelet[2451]: I1213 14:16:09.063448 2451 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:16:09.063717 kubelet[2451]: I1213 14:16:09.063695 2451 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:16:09.063884 kubelet[2451]: I1213 14:16:09.063863 2451 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 14:16:09.064099 kubelet[2451]: E1213 14:16:09.064068 2451 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:16:09.065194 kubelet[2451]: W1213 14:16:09.065022 2451 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.24.217:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.24.217:6443: connect: connection refused Dec 13 14:16:09.065465 kubelet[2451]: E1213 14:16:09.065424 2451 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.24.217:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.24.217:6443: connect: connection refused Dec 13 14:16:09.066000 audit[2477]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=2477 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:09.066000 audit[2477]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffef656f00 a2=0 a3=1 items=0 ppid=2451 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:09.066000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:16:09.067000 audit[2476]: NETFILTER_CFG table=mangle:33 family=2 entries=1 op=nft_register_chain pid=2476 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:09.067000 audit[2476]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffceeff370 a2=0 a3=1 items=0 ppid=2451 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:09.067000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:16:09.070396 kubelet[2451]: I1213 14:16:09.070362 2451 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:16:09.069000 audit[2451]: AVC avc: denied { mac_admin } for pid=2451 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:09.069000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:16:09.069000 audit[2451]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000e26240 a1=4000e17068 a2=4000e26210 a3=25 items=0 ppid=1 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:09.069000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:16:09.071130 kubelet[2451]: I1213 14:16:09.071074 2451 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:16:09.071526 kubelet[2451]: I1213 14:16:09.071468 2451 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:16:09.071000 audit[2478]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2478 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:09.071000 audit[2478]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff8a43450 a2=0 a3=1 items=0 ppid=2451 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:09.071000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:16:09.075789 kubelet[2451]: I1213 14:16:09.075747 2451 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:16:09.076486 kubelet[2451]: I1213 14:16:09.076452 2451 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-24-217" Dec 13 14:16:09.076000 audit[2479]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=2479 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:09.076000 audit[2479]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffc3d85ea0 a2=0 a3=1 items=0 ppid=2451 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:09.076000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:16:09.081895 kubelet[2451]: E1213 14:16:09.081840 2451 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.24.217:6443/api/v1/nodes\": dial tcp 172.31.24.217:6443: connect: connection refused" node="ip-172-31-24-217" Dec 13 14:16:09.082000 audit[2481]: NETFILTER_CFG table=filter:36 family=10 entries=2 op=nft_register_chain pid=2481 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:09.082000 audit[2481]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc6ed3180 a2=0 a3=1 items=0 ppid=2451 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:09.082000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:16:09.084902 kubelet[2451]: E1213 14:16:09.084867 2451 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-24-217\" not found" Dec 13 14:16:09.084000 audit[2480]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=2480 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:09.084000 audit[2480]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd95e6410 a2=0 a3=1 items=0 ppid=2451 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:09.084000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:16:09.165190 kubelet[2451]: I1213 14:16:09.164975 2451 topology_manager.go:215] "Topology Admit Handler" podUID="4e442ae8cb21488732c44336574a8944" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-24-217" Dec 13 14:16:09.171626 kubelet[2451]: I1213 14:16:09.171548 2451 topology_manager.go:215] "Topology Admit Handler" podUID="6e939e229ee8f0c14bbb6b1749827c57" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-24-217" Dec 13 14:16:09.172420 kubelet[2451]: I1213 14:16:09.172377 2451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4e442ae8cb21488732c44336574a8944-k8s-certs\") pod \"kube-apiserver-ip-172-31-24-217\" (UID: \"4e442ae8cb21488732c44336574a8944\") " pod="kube-system/kube-apiserver-ip-172-31-24-217" Dec 13 14:16:09.172695 kubelet[2451]: E1213 14:16:09.172638 2451 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.24.217:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-24-217?timeout=10s\": dial tcp 172.31.24.217:6443: connect: connection refused" interval="400ms" Dec 13 14:16:09.172827 kubelet[2451]: I1213 14:16:09.172645 2451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4e442ae8cb21488732c44336574a8944-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-24-217\" (UID: \"4e442ae8cb21488732c44336574a8944\") " pod="kube-system/kube-apiserver-ip-172-31-24-217" Dec 13 14:16:09.173103 kubelet[2451]: I1213 14:16:09.173035 2451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4e442ae8cb21488732c44336574a8944-ca-certs\") pod \"kube-apiserver-ip-172-31-24-217\" (UID: \"4e442ae8cb21488732c44336574a8944\") " pod="kube-system/kube-apiserver-ip-172-31-24-217" Dec 13 14:16:09.177615 kubelet[2451]: I1213 14:16:09.177369 2451 topology_manager.go:215] "Topology Admit Handler" podUID="61ec8f35b47b95dcfe5a79b52992ae55" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-24-217" Dec 13 14:16:09.190723 systemd[1]: Created slice kubepods-burstable-pod4e442ae8cb21488732c44336574a8944.slice. Dec 13 14:16:09.205418 systemd[1]: Created slice kubepods-burstable-pod6e939e229ee8f0c14bbb6b1749827c57.slice. Dec 13 14:16:09.221860 systemd[1]: Created slice kubepods-burstable-pod61ec8f35b47b95dcfe5a79b52992ae55.slice. Dec 13 14:16:09.274145 kubelet[2451]: I1213 14:16:09.274058 2451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6e939e229ee8f0c14bbb6b1749827c57-ca-certs\") pod \"kube-controller-manager-ip-172-31-24-217\" (UID: \"6e939e229ee8f0c14bbb6b1749827c57\") " pod="kube-system/kube-controller-manager-ip-172-31-24-217" Dec 13 14:16:09.274381 kubelet[2451]: I1213 14:16:09.274183 2451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/6e939e229ee8f0c14bbb6b1749827c57-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-24-217\" (UID: \"6e939e229ee8f0c14bbb6b1749827c57\") " pod="kube-system/kube-controller-manager-ip-172-31-24-217" Dec 13 14:16:09.274381 kubelet[2451]: I1213 14:16:09.274237 2451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6e939e229ee8f0c14bbb6b1749827c57-k8s-certs\") pod \"kube-controller-manager-ip-172-31-24-217\" (UID: \"6e939e229ee8f0c14bbb6b1749827c57\") " pod="kube-system/kube-controller-manager-ip-172-31-24-217" Dec 13 14:16:09.274381 kubelet[2451]: I1213 14:16:09.274284 2451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6e939e229ee8f0c14bbb6b1749827c57-kubeconfig\") pod \"kube-controller-manager-ip-172-31-24-217\" (UID: \"6e939e229ee8f0c14bbb6b1749827c57\") " pod="kube-system/kube-controller-manager-ip-172-31-24-217" Dec 13 14:16:09.274381 kubelet[2451]: I1213 14:16:09.274329 2451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6e939e229ee8f0c14bbb6b1749827c57-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-24-217\" (UID: \"6e939e229ee8f0c14bbb6b1749827c57\") " pod="kube-system/kube-controller-manager-ip-172-31-24-217" Dec 13 14:16:09.274747 kubelet[2451]: I1213 14:16:09.274420 2451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/61ec8f35b47b95dcfe5a79b52992ae55-kubeconfig\") pod \"kube-scheduler-ip-172-31-24-217\" (UID: \"61ec8f35b47b95dcfe5a79b52992ae55\") " pod="kube-system/kube-scheduler-ip-172-31-24-217" Dec 13 14:16:09.285685 kubelet[2451]: I1213 14:16:09.285596 2451 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-24-217" Dec 13 14:16:09.286532 kubelet[2451]: E1213 14:16:09.286479 2451 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.24.217:6443/api/v1/nodes\": dial tcp 172.31.24.217:6443: connect: connection refused" node="ip-172-31-24-217" Dec 13 14:16:09.506485 env[1824]: time="2024-12-13T14:16:09.506329298Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-24-217,Uid:4e442ae8cb21488732c44336574a8944,Namespace:kube-system,Attempt:0,}" Dec 13 14:16:09.519298 env[1824]: time="2024-12-13T14:16:09.518711548Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-24-217,Uid:6e939e229ee8f0c14bbb6b1749827c57,Namespace:kube-system,Attempt:0,}" Dec 13 14:16:09.528927 env[1824]: time="2024-12-13T14:16:09.528836102Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-24-217,Uid:61ec8f35b47b95dcfe5a79b52992ae55,Namespace:kube-system,Attempt:0,}" Dec 13 14:16:09.574129 kubelet[2451]: E1213 14:16:09.574046 2451 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.24.217:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-24-217?timeout=10s\": dial tcp 172.31.24.217:6443: connect: connection refused" interval="800ms" Dec 13 14:16:09.689928 kubelet[2451]: I1213 14:16:09.689851 2451 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-24-217" Dec 13 14:16:09.690540 kubelet[2451]: E1213 14:16:09.690471 2451 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.24.217:6443/api/v1/nodes\": dial tcp 172.31.24.217:6443: connect: connection refused" node="ip-172-31-24-217" Dec 13 14:16:09.746930 kubelet[2451]: W1213 14:16:09.746756 2451 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.24.217:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.24.217:6443: connect: connection refused Dec 13 14:16:09.746930 kubelet[2451]: E1213 14:16:09.746855 2451 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.24.217:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.24.217:6443: connect: connection refused Dec 13 14:16:09.835612 kubelet[2451]: E1213 14:16:09.835428 2451 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.24.217:6443/api/v1/namespaces/default/events\": dial tcp 172.31.24.217:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-24-217.1810c23039ff74b7 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-24-217,UID:ip-172-31-24-217,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-24-217,},FirstTimestamp:2024-12-13 14:16:08.924902583 +0000 UTC m=+1.467377839,LastTimestamp:2024-12-13 14:16:08.924902583 +0000 UTC m=+1.467377839,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-24-217,}" Dec 13 14:16:09.933742 kubelet[2451]: W1213 14:16:09.933658 2451 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.24.217:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.24.217:6443: connect: connection refused Dec 13 14:16:09.933742 kubelet[2451]: E1213 14:16:09.933735 2451 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.24.217:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.24.217:6443: connect: connection refused Dec 13 14:16:09.951599 kubelet[2451]: W1213 14:16:09.951396 2451 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.24.217:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-24-217&limit=500&resourceVersion=0": dial tcp 172.31.24.217:6443: connect: connection refused Dec 13 14:16:09.951599 kubelet[2451]: E1213 14:16:09.951542 2451 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.24.217:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-24-217&limit=500&resourceVersion=0": dial tcp 172.31.24.217:6443: connect: connection refused Dec 13 14:16:10.035525 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1782493691.mount: Deactivated successfully. Dec 13 14:16:10.062512 env[1824]: time="2024-12-13T14:16:10.062437741Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:10.065723 env[1824]: time="2024-12-13T14:16:10.065663882Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:10.069258 env[1824]: time="2024-12-13T14:16:10.069211837Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:10.071175 env[1824]: time="2024-12-13T14:16:10.071077315Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:10.073969 env[1824]: time="2024-12-13T14:16:10.073916649Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:10.078381 env[1824]: time="2024-12-13T14:16:10.078316301Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:10.080617 env[1824]: time="2024-12-13T14:16:10.080514129Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:10.083421 env[1824]: time="2024-12-13T14:16:10.083344991Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:10.089029 env[1824]: time="2024-12-13T14:16:10.088102074Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:10.095007 env[1824]: time="2024-12-13T14:16:10.094926330Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:10.097633 env[1824]: time="2024-12-13T14:16:10.097561713Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:10.127040 env[1824]: time="2024-12-13T14:16:10.126965149Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:10.159353 env[1824]: time="2024-12-13T14:16:10.159185503Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:16:10.159629 env[1824]: time="2024-12-13T14:16:10.159570605Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:16:10.159829 env[1824]: time="2024-12-13T14:16:10.159776693Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:16:10.167409 env[1824]: time="2024-12-13T14:16:10.167304710Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a3b20288704b3bcec04134316bc7d16f47ff1949af70f88da07683eb64b984da pid=2500 runtime=io.containerd.runc.v2 Dec 13 14:16:10.169999 env[1824]: time="2024-12-13T14:16:10.169845281Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:16:10.170251 env[1824]: time="2024-12-13T14:16:10.169984888Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:16:10.170251 env[1824]: time="2024-12-13T14:16:10.170016328Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:16:10.170478 env[1824]: time="2024-12-13T14:16:10.170356023Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c51efd590223306beddf4ad6216b29ffefb1bac9dc05278a7709b8ff287aa025 pid=2499 runtime=io.containerd.runc.v2 Dec 13 14:16:10.197910 env[1824]: time="2024-12-13T14:16:10.197744738Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:16:10.198376 env[1824]: time="2024-12-13T14:16:10.198301176Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:16:10.198589 env[1824]: time="2024-12-13T14:16:10.198527039Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:16:10.199103 env[1824]: time="2024-12-13T14:16:10.198995782Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3b45c48681753d5540347a175210d28f0e3d8bda6a8060ca5ecabdee09b74de2 pid=2530 runtime=io.containerd.runc.v2 Dec 13 14:16:10.211240 systemd[1]: Started cri-containerd-a3b20288704b3bcec04134316bc7d16f47ff1949af70f88da07683eb64b984da.scope. Dec 13 14:16:10.244757 systemd[1]: Started cri-containerd-c51efd590223306beddf4ad6216b29ffefb1bac9dc05278a7709b8ff287aa025.scope. Dec 13 14:16:10.281200 systemd[1]: Started cri-containerd-3b45c48681753d5540347a175210d28f0e3d8bda6a8060ca5ecabdee09b74de2.scope. Dec 13 14:16:10.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.297000 audit: BPF prog-id=64 op=LOAD Dec 13 14:16:10.297000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.297000 audit[2525]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2499 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335316566643539303232333330366265646466346164363231366232 Dec 13 14:16:10.297000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.297000 audit[2525]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2499 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335316566643539303232333330366265646466346164363231366232 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit: BPF prog-id=65 op=LOAD Dec 13 14:16:10.298000 audit[2525]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2499 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335316566643539303232333330366265646466346164363231366232 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit: BPF prog-id=66 op=LOAD Dec 13 14:16:10.298000 audit[2525]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2499 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335316566643539303232333330366265646466346164363231366232 Dec 13 14:16:10.298000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:16:10.298000 audit: BPF prog-id=65 op=UNLOAD Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.298000 audit: BPF prog-id=67 op=LOAD Dec 13 14:16:10.298000 audit[2525]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2499 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335316566643539303232333330366265646466346164363231366232 Dec 13 14:16:10.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.319000 audit: BPF prog-id=68 op=LOAD Dec 13 14:16:10.320000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.320000 audit[2527]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2500 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133623230323838373034623362636563303431333433313662633764 Dec 13 14:16:10.321000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.321000 audit[2527]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2500 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133623230323838373034623362636563303431333433313662633764 Dec 13 14:16:10.321000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.321000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.321000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.321000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.321000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.321000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.321000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.321000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.321000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.321000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.321000 audit: BPF prog-id=69 op=LOAD Dec 13 14:16:10.321000 audit[2527]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2500 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133623230323838373034623362636563303431333433313662633764 Dec 13 14:16:10.323000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.323000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.323000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.323000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.323000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.323000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.323000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.323000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.323000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.323000 audit: BPF prog-id=70 op=LOAD Dec 13 14:16:10.323000 audit[2527]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2500 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133623230323838373034623362636563303431333433313662633764 Dec 13 14:16:10.324000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:16:10.324000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:16:10.324000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.324000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.324000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.324000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.324000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.324000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.324000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.324000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.324000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.324000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.324000 audit: BPF prog-id=71 op=LOAD Dec 13 14:16:10.324000 audit[2527]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2500 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133623230323838373034623362636563303431333433313662633764 Dec 13 14:16:10.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.345000 audit: BPF prog-id=72 op=LOAD Dec 13 14:16:10.346000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.346000 audit[2558]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2530 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362343563343836383137353364353534303334376131373532313064 Dec 13 14:16:10.346000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.346000 audit[2558]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2530 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362343563343836383137353364353534303334376131373532313064 Dec 13 14:16:10.346000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.346000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.346000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.346000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.346000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.346000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.346000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.346000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.346000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.346000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.346000 audit: BPF prog-id=73 op=LOAD Dec 13 14:16:10.346000 audit[2558]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2530 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362343563343836383137353364353534303334376131373532313064 Dec 13 14:16:10.347000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.347000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.347000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.347000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.347000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.347000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.347000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.347000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.347000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.347000 audit: BPF prog-id=74 op=LOAD Dec 13 14:16:10.347000 audit[2558]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2530 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362343563343836383137353364353534303334376131373532313064 Dec 13 14:16:10.347000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:16:10.347000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:16:10.347000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.347000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.347000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.347000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.347000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.347000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.347000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.347000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.347000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.347000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.347000 audit: BPF prog-id=75 op=LOAD Dec 13 14:16:10.347000 audit[2558]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2530 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362343563343836383137353364353534303334376131373532313064 Dec 13 14:16:10.361956 update_engine[1807]: I1213 14:16:10.360985 1807 update_attempter.cc:509] Updating boot flags... Dec 13 14:16:10.378195 kubelet[2451]: E1213 14:16:10.375727 2451 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.24.217:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-24-217?timeout=10s\": dial tcp 172.31.24.217:6443: connect: connection refused" interval="1.6s" Dec 13 14:16:10.394928 kubelet[2451]: W1213 14:16:10.394832 2451 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.24.217:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.24.217:6443: connect: connection refused Dec 13 14:16:10.395085 kubelet[2451]: E1213 14:16:10.394938 2451 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.24.217:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.24.217:6443: connect: connection refused Dec 13 14:16:10.471406 env[1824]: time="2024-12-13T14:16:10.471333678Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-24-217,Uid:4e442ae8cb21488732c44336574a8944,Namespace:kube-system,Attempt:0,} returns sandbox id \"c51efd590223306beddf4ad6216b29ffefb1bac9dc05278a7709b8ff287aa025\"" Dec 13 14:16:10.486189 env[1824]: time="2024-12-13T14:16:10.486063986Z" level=info msg="CreateContainer within sandbox \"c51efd590223306beddf4ad6216b29ffefb1bac9dc05278a7709b8ff287aa025\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 14:16:10.493056 env[1824]: time="2024-12-13T14:16:10.492948097Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-24-217,Uid:61ec8f35b47b95dcfe5a79b52992ae55,Namespace:kube-system,Attempt:0,} returns sandbox id \"a3b20288704b3bcec04134316bc7d16f47ff1949af70f88da07683eb64b984da\"" Dec 13 14:16:10.495370 kubelet[2451]: I1213 14:16:10.495048 2451 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-24-217" Dec 13 14:16:10.495753 kubelet[2451]: E1213 14:16:10.495698 2451 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.24.217:6443/api/v1/nodes\": dial tcp 172.31.24.217:6443: connect: connection refused" node="ip-172-31-24-217" Dec 13 14:16:10.500597 env[1824]: time="2024-12-13T14:16:10.500485943Z" level=info msg="CreateContainer within sandbox \"a3b20288704b3bcec04134316bc7d16f47ff1949af70f88da07683eb64b984da\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 14:16:10.524021 env[1824]: time="2024-12-13T14:16:10.523846380Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-24-217,Uid:6e939e229ee8f0c14bbb6b1749827c57,Namespace:kube-system,Attempt:0,} returns sandbox id \"3b45c48681753d5540347a175210d28f0e3d8bda6a8060ca5ecabdee09b74de2\"" Dec 13 14:16:10.546498 env[1824]: time="2024-12-13T14:16:10.546030905Z" level=info msg="CreateContainer within sandbox \"3b45c48681753d5540347a175210d28f0e3d8bda6a8060ca5ecabdee09b74de2\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 14:16:10.563438 env[1824]: time="2024-12-13T14:16:10.563373460Z" level=info msg="CreateContainer within sandbox \"a3b20288704b3bcec04134316bc7d16f47ff1949af70f88da07683eb64b984da\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"fa78714b27c3fa55a707d672782d3be861658f82e96799f19884a8d0eea2bb5f\"" Dec 13 14:16:10.578996 env[1824]: time="2024-12-13T14:16:10.578936745Z" level=info msg="StartContainer for \"fa78714b27c3fa55a707d672782d3be861658f82e96799f19884a8d0eea2bb5f\"" Dec 13 14:16:10.604193 env[1824]: time="2024-12-13T14:16:10.603957736Z" level=info msg="CreateContainer within sandbox \"c51efd590223306beddf4ad6216b29ffefb1bac9dc05278a7709b8ff287aa025\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"d61768b2af890e5f39a0dcbad58c9bda175b7293906cb86de605207da2bd750d\"" Dec 13 14:16:10.611269 env[1824]: time="2024-12-13T14:16:10.611209899Z" level=info msg="StartContainer for \"d61768b2af890e5f39a0dcbad58c9bda175b7293906cb86de605207da2bd750d\"" Dec 13 14:16:10.630993 env[1824]: time="2024-12-13T14:16:10.630919601Z" level=info msg="CreateContainer within sandbox \"3b45c48681753d5540347a175210d28f0e3d8bda6a8060ca5ecabdee09b74de2\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"9e54fa37d24dfcce020e205b5c25fac74423804f2a7a655b0404505b981b33d7\"" Dec 13 14:16:10.632155 env[1824]: time="2024-12-13T14:16:10.632046757Z" level=info msg="StartContainer for \"9e54fa37d24dfcce020e205b5c25fac74423804f2a7a655b0404505b981b33d7\"" Dec 13 14:16:10.677769 systemd[1]: Started cri-containerd-fa78714b27c3fa55a707d672782d3be861658f82e96799f19884a8d0eea2bb5f.scope. Dec 13 14:16:10.728657 systemd[1]: Started cri-containerd-d61768b2af890e5f39a0dcbad58c9bda175b7293906cb86de605207da2bd750d.scope. Dec 13 14:16:10.760955 systemd[1]: Started cri-containerd-9e54fa37d24dfcce020e205b5c25fac74423804f2a7a655b0404505b981b33d7.scope. Dec 13 14:16:10.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.835000 audit: BPF prog-id=76 op=LOAD Dec 13 14:16:10.837000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.837000 audit[2675]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2500 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661373837313462323763336661353561373037643637323738326433 Dec 13 14:16:10.841000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.841000 audit[2675]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2500 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661373837313462323763336661353561373037643637323738326433 Dec 13 14:16:10.843000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.843000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.843000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.843000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.843000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.843000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.843000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.843000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.843000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.843000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.843000 audit: BPF prog-id=77 op=LOAD Dec 13 14:16:10.843000 audit[2675]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2500 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661373837313462323763336661353561373037643637323738326433 Dec 13 14:16:10.844000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.844000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.844000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.844000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.844000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.844000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.844000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.844000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.844000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.844000 audit: BPF prog-id=78 op=LOAD Dec 13 14:16:10.844000 audit[2675]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2500 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661373837313462323763336661353561373037643637323738326433 Dec 13 14:16:10.844000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:16:10.844000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:16:10.844000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.844000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.844000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.844000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.844000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.844000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.844000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.844000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.844000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.844000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.844000 audit: BPF prog-id=79 op=LOAD Dec 13 14:16:10.844000 audit[2675]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2500 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661373837313462323763336661353561373037643637323738326433 Dec 13 14:16:10.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.846000 audit: BPF prog-id=80 op=LOAD Dec 13 14:16:10.847000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.847000 audit[2722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2530 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965353466613337643234646663636530323065323035623563323566 Dec 13 14:16:10.848000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.848000 audit[2722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2530 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965353466613337643234646663636530323065323035623563323566 Dec 13 14:16:10.848000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.848000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.848000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.848000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.848000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.848000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.848000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.848000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.848000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.848000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.848000 audit: BPF prog-id=81 op=LOAD Dec 13 14:16:10.848000 audit[2722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2530 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965353466613337643234646663636530323065323035623563323566 Dec 13 14:16:10.848000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.848000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.848000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.848000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.848000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.848000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.848000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.848000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.848000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.848000 audit: BPF prog-id=82 op=LOAD Dec 13 14:16:10.848000 audit[2722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2530 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965353466613337643234646663636530323065323035623563323566 Dec 13 14:16:10.849000 audit: BPF prog-id=82 op=UNLOAD Dec 13 14:16:10.849000 audit: BPF prog-id=81 op=UNLOAD Dec 13 14:16:10.849000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.849000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.849000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.849000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.849000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.849000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.849000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.849000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.849000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.849000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.849000 audit: BPF prog-id=83 op=LOAD Dec 13 14:16:10.849000 audit[2722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2530 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965353466613337643234646663636530323065323035623563323566 Dec 13 14:16:10.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.899000 audit: BPF prog-id=84 op=LOAD Dec 13 14:16:10.906000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.906000 audit[2694]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=2499 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436313736386232616638393065356633396130646362616435386339 Dec 13 14:16:10.908000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.908000 audit[2694]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2499 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436313736386232616638393065356633396130646362616435386339 Dec 13 14:16:10.908000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.908000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.908000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.908000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.908000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.908000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.908000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.908000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.908000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.908000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.908000 audit: BPF prog-id=85 op=LOAD Dec 13 14:16:10.908000 audit[2694]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2499 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436313736386232616638393065356633396130646362616435386339 Dec 13 14:16:10.909000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.909000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.909000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.909000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.909000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.909000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.909000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.909000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.909000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.909000 audit: BPF prog-id=86 op=LOAD Dec 13 14:16:10.909000 audit[2694]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2499 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436313736386232616638393065356633396130646362616435386339 Dec 13 14:16:10.909000 audit: BPF prog-id=86 op=UNLOAD Dec 13 14:16:10.909000 audit: BPF prog-id=85 op=UNLOAD Dec 13 14:16:10.909000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.909000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.909000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.909000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.909000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.909000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.909000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.909000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.909000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.909000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:10.909000 audit: BPF prog-id=87 op=LOAD Dec 13 14:16:10.909000 audit[2694]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2499 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:10.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436313736386232616638393065356633396130646362616435386339 Dec 13 14:16:10.975850 env[1824]: time="2024-12-13T14:16:10.975752996Z" level=info msg="StartContainer for \"9e54fa37d24dfcce020e205b5c25fac74423804f2a7a655b0404505b981b33d7\" returns successfully" Dec 13 14:16:11.036196 kubelet[2451]: E1213 14:16:11.032397 2451 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.24.217:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.24.217:6443: connect: connection refused Dec 13 14:16:11.128321 env[1824]: time="2024-12-13T14:16:11.128174619Z" level=info msg="StartContainer for \"d61768b2af890e5f39a0dcbad58c9bda175b7293906cb86de605207da2bd750d\" returns successfully" Dec 13 14:16:11.161996 env[1824]: time="2024-12-13T14:16:11.161926653Z" level=info msg="StartContainer for \"fa78714b27c3fa55a707d672782d3be861658f82e96799f19884a8d0eea2bb5f\" returns successfully" Dec 13 14:16:12.099001 kubelet[2451]: I1213 14:16:12.098936 2451 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-24-217" Dec 13 14:16:14.024000 audit[2762]: AVC avc: denied { watch } for pid=2762 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:14.027786 kernel: kauditd_printk_skb: 559 callbacks suppressed Dec 13 14:16:14.028009 kernel: audit: type=1400 audit(1734099374.024:565): avc: denied { watch } for pid=2762 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:14.024000 audit[2762]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000a2eb10 a2=fc6 a3=0 items=0 ppid=2530 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:16:14.050974 kernel: audit: type=1300 audit(1734099374.024:565): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000a2eb10 a2=fc6 a3=0 items=0 ppid=2530 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:16:14.051221 kernel: audit: type=1327 audit(1734099374.024:565): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:16:14.024000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:16:14.024000 audit[2762]: AVC avc: denied { watch } for pid=2762 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:14.072042 kernel: audit: type=1400 audit(1734099374.024:566): avc: denied { watch } for pid=2762 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:14.072232 kernel: audit: type=1300 audit(1734099374.024:566): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400126e520 a2=fc6 a3=0 items=0 ppid=2530 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:16:14.024000 audit[2762]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400126e520 a2=fc6 a3=0 items=0 ppid=2530 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:16:14.024000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:16:14.095836 kernel: audit: type=1327 audit(1734099374.024:566): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:16:14.807000 audit[2769]: AVC avc: denied { watch } for pid=2769 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:14.807000 audit[2769]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=40043bc570 a2=fc6 a3=0 items=0 ppid=2499 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 key=(null) Dec 13 14:16:14.832477 kernel: audit: type=1400 audit(1734099374.807:567): avc: denied { watch } for pid=2769 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:14.832666 kernel: audit: type=1300 audit(1734099374.807:567): arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=40043bc570 a2=fc6 a3=0 items=0 ppid=2499 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 key=(null) Dec 13 14:16:14.836308 kernel: audit: type=1327 audit(1734099374.807:567): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32342E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:16:14.807000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32342E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:16:14.808000 audit[2769]: AVC avc: denied { watch } for pid=2769 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=8274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:14.857211 kernel: audit: type=1400 audit(1734099374.808:568): avc: denied { watch } for pid=2769 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=8274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:14.808000 audit[2769]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=40043bc660 a2=fc6 a3=0 items=0 ppid=2499 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 key=(null) Dec 13 14:16:14.808000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32342E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:16:14.837000 audit[2769]: AVC avc: denied { watch } for pid=2769 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=8281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:14.837000 audit[2769]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=40043bd5f0 a2=fc6 a3=0 items=0 ppid=2499 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 key=(null) Dec 13 14:16:14.837000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32342E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:16:14.838000 audit[2769]: AVC avc: denied { watch } for pid=2769 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:14.838000 audit[2769]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=4005e1c320 a2=fc6 a3=0 items=0 ppid=2499 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 key=(null) Dec 13 14:16:14.838000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32342E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:16:14.949000 audit[2769]: AVC avc: denied { watch } for pid=2769 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:14.949000 audit[2769]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=44 a1=4009506f20 a2=fc6 a3=0 items=0 ppid=2499 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 key=(null) Dec 13 14:16:14.949000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32342E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:16:14.950000 audit[2769]: AVC avc: denied { watch } for pid=2769 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:14.950000 audit[2769]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=44 a1=4003669860 a2=fc6 a3=0 items=0 ppid=2499 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 key=(null) Dec 13 14:16:14.950000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32342E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:16:15.056815 kubelet[2451]: E1213 14:16:15.056746 2451 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-24-217\" not found" node="ip-172-31-24-217" Dec 13 14:16:15.260590 kubelet[2451]: I1213 14:16:15.260438 2451 kubelet_node_status.go:76] "Successfully registered node" node="ip-172-31-24-217" Dec 13 14:16:15.676143 kubelet[2451]: E1213 14:16:15.676081 2451 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-24-217\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ip-172-31-24-217" Dec 13 14:16:15.701907 kubelet[2451]: E1213 14:16:15.701853 2451 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ip-172-31-24-217\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-ip-172-31-24-217" Dec 13 14:16:15.927231 kubelet[2451]: I1213 14:16:15.927048 2451 apiserver.go:52] "Watching apiserver" Dec 13 14:16:15.969323 kubelet[2451]: I1213 14:16:15.969229 2451 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 14:16:17.934832 systemd[1]: Reloading. Dec 13 14:16:18.094735 /usr/lib/systemd/system-generators/torcx-generator[2840]: time="2024-12-13T14:16:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:16:18.094805 /usr/lib/systemd/system-generators/torcx-generator[2840]: time="2024-12-13T14:16:18Z" level=info msg="torcx already run" Dec 13 14:16:18.297562 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:16:18.297665 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:16:18.343099 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:16:18.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.551000 audit: BPF prog-id=88 op=LOAD Dec 13 14:16:18.551000 audit: BPF prog-id=49 op=UNLOAD Dec 13 14:16:18.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.553000 audit: BPF prog-id=89 op=LOAD Dec 13 14:16:18.553000 audit: BPF prog-id=84 op=UNLOAD Dec 13 14:16:18.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.557000 audit: BPF prog-id=90 op=LOAD Dec 13 14:16:18.557000 audit: BPF prog-id=50 op=UNLOAD Dec 13 14:16:18.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.557000 audit: BPF prog-id=91 op=LOAD Dec 13 14:16:18.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.558000 audit: BPF prog-id=92 op=LOAD Dec 13 14:16:18.558000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:16:18.558000 audit: BPF prog-id=52 op=UNLOAD Dec 13 14:16:18.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.559000 audit: BPF prog-id=93 op=LOAD Dec 13 14:16:18.560000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:16:18.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.561000 audit: BPF prog-id=94 op=LOAD Dec 13 14:16:18.561000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:16:18.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.563000 audit: BPF prog-id=95 op=LOAD Dec 13 14:16:18.564000 audit: BPF prog-id=53 op=UNLOAD Dec 13 14:16:18.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.564000 audit: BPF prog-id=96 op=LOAD Dec 13 14:16:18.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.564000 audit: BPF prog-id=97 op=LOAD Dec 13 14:16:18.565000 audit: BPF prog-id=54 op=UNLOAD Dec 13 14:16:18.565000 audit: BPF prog-id=55 op=UNLOAD Dec 13 14:16:18.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.570000 audit: BPF prog-id=98 op=LOAD Dec 13 14:16:18.570000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:16:18.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.572000 audit: BPF prog-id=99 op=LOAD Dec 13 14:16:18.572000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:16:18.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.576000 audit: BPF prog-id=100 op=LOAD Dec 13 14:16:18.576000 audit: BPF prog-id=58 op=UNLOAD Dec 13 14:16:18.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.581000 audit: BPF prog-id=101 op=LOAD Dec 13 14:16:18.581000 audit: BPF prog-id=68 op=UNLOAD Dec 13 14:16:18.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.588000 audit: BPF prog-id=102 op=LOAD Dec 13 14:16:18.589000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:16:18.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.591000 audit: BPF prog-id=103 op=LOAD Dec 13 14:16:18.591000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:16:18.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.592000 audit: BPF prog-id=104 op=LOAD Dec 13 14:16:18.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.593000 audit: BPF prog-id=105 op=LOAD Dec 13 14:16:18.593000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:16:18.593000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:16:18.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.594000 audit: BPF prog-id=106 op=LOAD Dec 13 14:16:18.594000 audit: BPF prog-id=61 op=UNLOAD Dec 13 14:16:18.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.595000 audit: BPF prog-id=107 op=LOAD Dec 13 14:16:18.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:18.595000 audit: BPF prog-id=108 op=LOAD Dec 13 14:16:18.595000 audit: BPF prog-id=62 op=UNLOAD Dec 13 14:16:18.595000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:16:18.638258 systemd[1]: Stopping kubelet.service... Dec 13 14:16:18.639442 kubelet[2451]: I1213 14:16:18.639383 2451 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:16:18.658099 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:16:18.658585 systemd[1]: Stopped kubelet.service. Dec 13 14:16:18.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:18.658704 systemd[1]: kubelet.service: Consumed 2.299s CPU time. Dec 13 14:16:18.662925 systemd[1]: Starting kubelet.service... Dec 13 14:16:18.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:18.998446 systemd[1]: Started kubelet.service. Dec 13 14:16:19.124131 kubelet[2897]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:16:19.124859 kubelet[2897]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:16:19.124968 kubelet[2897]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:16:19.125311 kubelet[2897]: I1213 14:16:19.125251 2897 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:16:19.140196 kubelet[2897]: I1213 14:16:19.140090 2897 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 14:16:19.140594 kubelet[2897]: I1213 14:16:19.140549 2897 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:16:19.141310 kubelet[2897]: I1213 14:16:19.141263 2897 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 14:16:19.145034 kubelet[2897]: I1213 14:16:19.144971 2897 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 14:16:19.148813 kubelet[2897]: I1213 14:16:19.148766 2897 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:16:19.181513 kubelet[2897]: I1213 14:16:19.181458 2897 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:16:19.183457 kubelet[2897]: I1213 14:16:19.182099 2897 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:16:19.183457 kubelet[2897]: I1213 14:16:19.182194 2897 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-24-217","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:16:19.183457 kubelet[2897]: I1213 14:16:19.182759 2897 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:16:19.183457 kubelet[2897]: I1213 14:16:19.182841 2897 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:16:19.183457 kubelet[2897]: I1213 14:16:19.183030 2897 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:16:19.184784 kubelet[2897]: I1213 14:16:19.183572 2897 kubelet.go:400] "Attempting to sync node with API server" Dec 13 14:16:19.184784 kubelet[2897]: I1213 14:16:19.183636 2897 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:16:19.184784 kubelet[2897]: I1213 14:16:19.183729 2897 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:16:19.184784 kubelet[2897]: I1213 14:16:19.183834 2897 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:16:19.194431 kubelet[2897]: I1213 14:16:19.194368 2897 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:16:19.194761 kubelet[2897]: I1213 14:16:19.194720 2897 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:16:19.195561 kubelet[2897]: I1213 14:16:19.195495 2897 server.go:1264] "Started kubelet" Dec 13 14:16:19.200000 audit[2897]: AVC avc: denied { mac_admin } for pid=2897 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:19.203670 kernel: kauditd_printk_skb: 260 callbacks suppressed Dec 13 14:16:19.203805 kernel: audit: type=1400 audit(1734099379.200:819): avc: denied { mac_admin } for pid=2897 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:19.216928 kubelet[2897]: I1213 14:16:19.216845 2897 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:16:19.219084 kubelet[2897]: I1213 14:16:19.219046 2897 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:16:19.200000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:16:19.226035 kubelet[2897]: I1213 14:16:19.220435 2897 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:16:19.226035 kubelet[2897]: I1213 14:16:19.220519 2897 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:16:19.226035 kubelet[2897]: I1213 14:16:19.220571 2897 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:16:19.226457 kubelet[2897]: I1213 14:16:19.226406 2897 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:16:19.241075 kernel: audit: type=1401 audit(1734099379.200:819): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:16:19.241233 kernel: audit: type=1300 audit(1734099379.200:819): arch=c00000b7 syscall=5 success=no exit=-22 a0=40006a3530 a1=40007873e0 a2=40006a3500 a3=25 items=0 ppid=1 pid=2897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:19.200000 audit[2897]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40006a3530 a1=40007873e0 a2=40006a3500 a3=25 items=0 ppid=1 pid=2897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:19.241454 kubelet[2897]: I1213 14:16:19.241027 2897 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:16:19.200000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:16:19.251661 kernel: audit: type=1327 audit(1734099379.200:819): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:16:19.251861 kubelet[2897]: I1213 14:16:19.241688 2897 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 14:16:19.251861 kubelet[2897]: I1213 14:16:19.241981 2897 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:16:19.219000 audit[2897]: AVC avc: denied { mac_admin } for pid=2897 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:19.263694 kernel: audit: type=1400 audit(1734099379.219:820): avc: denied { mac_admin } for pid=2897 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:19.219000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:16:19.269688 kernel: audit: type=1401 audit(1734099379.219:820): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:16:19.219000 audit[2897]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000903c00 a1=40007873f8 a2=40006a35c0 a3=25 items=0 ppid=1 pid=2897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:19.282340 kernel: audit: type=1300 audit(1734099379.219:820): arch=c00000b7 syscall=5 success=no exit=-22 a0=4000903c00 a1=40007873f8 a2=40006a35c0 a3=25 items=0 ppid=1 pid=2897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:19.295231 kernel: audit: type=1327 audit(1734099379.219:820): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:16:19.219000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:16:19.295475 kubelet[2897]: I1213 14:16:19.292336 2897 server.go:455] "Adding debug handlers to kubelet server" Dec 13 14:16:19.297661 kubelet[2897]: I1213 14:16:19.296476 2897 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:16:19.297661 kubelet[2897]: I1213 14:16:19.296631 2897 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:16:19.305379 kubelet[2897]: E1213 14:16:19.305335 2897 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:16:19.307947 kubelet[2897]: I1213 14:16:19.307901 2897 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:16:19.318174 kubelet[2897]: I1213 14:16:19.318086 2897 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:16:19.323357 kubelet[2897]: I1213 14:16:19.323313 2897 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:16:19.323592 kubelet[2897]: I1213 14:16:19.323569 2897 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:16:19.323755 kubelet[2897]: I1213 14:16:19.323734 2897 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 14:16:19.324921 kubelet[2897]: E1213 14:16:19.324886 2897 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:16:19.367484 kubelet[2897]: I1213 14:16:19.367427 2897 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-24-217" Dec 13 14:16:19.386305 kubelet[2897]: I1213 14:16:19.384568 2897 kubelet_node_status.go:112] "Node was previously registered" node="ip-172-31-24-217" Dec 13 14:16:19.386305 kubelet[2897]: I1213 14:16:19.384689 2897 kubelet_node_status.go:76] "Successfully registered node" node="ip-172-31-24-217" Dec 13 14:16:19.425427 kubelet[2897]: E1213 14:16:19.425371 2897 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 14:16:19.485880 kubelet[2897]: I1213 14:16:19.485395 2897 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:16:19.485880 kubelet[2897]: I1213 14:16:19.485436 2897 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:16:19.485880 kubelet[2897]: I1213 14:16:19.485485 2897 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:16:19.486293 kubelet[2897]: I1213 14:16:19.486024 2897 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 14:16:19.486293 kubelet[2897]: I1213 14:16:19.486069 2897 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 14:16:19.486293 kubelet[2897]: I1213 14:16:19.486160 2897 policy_none.go:49] "None policy: Start" Dec 13 14:16:19.488675 kubelet[2897]: I1213 14:16:19.488301 2897 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:16:19.488675 kubelet[2897]: I1213 14:16:19.488357 2897 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:16:19.488915 kubelet[2897]: I1213 14:16:19.488646 2897 state_mem.go:75] "Updated machine memory state" Dec 13 14:16:19.502370 kubelet[2897]: I1213 14:16:19.502232 2897 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:16:19.503194 kubelet[2897]: I1213 14:16:19.503148 2897 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:16:19.501000 audit[2897]: AVC avc: denied { mac_admin } for pid=2897 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:19.503821 kubelet[2897]: I1213 14:16:19.503751 2897 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:16:19.509321 kubelet[2897]: I1213 14:16:19.505313 2897 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:16:19.501000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:16:19.517790 kernel: audit: type=1400 audit(1734099379.501:821): avc: denied { mac_admin } for pid=2897 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:19.517926 kernel: audit: type=1401 audit(1734099379.501:821): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:16:19.501000 audit[2897]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000cdf3e0 a1=4000ff5710 a2=4000cdf350 a3=25 items=0 ppid=1 pid=2897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:19.501000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:16:19.625766 kubelet[2897]: I1213 14:16:19.625687 2897 topology_manager.go:215] "Topology Admit Handler" podUID="61ec8f35b47b95dcfe5a79b52992ae55" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-24-217" Dec 13 14:16:19.626154 kubelet[2897]: I1213 14:16:19.626087 2897 topology_manager.go:215] "Topology Admit Handler" podUID="4e442ae8cb21488732c44336574a8944" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-24-217" Dec 13 14:16:19.626356 kubelet[2897]: I1213 14:16:19.626329 2897 topology_manager.go:215] "Topology Admit Handler" podUID="6e939e229ee8f0c14bbb6b1749827c57" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-24-217" Dec 13 14:16:19.645816 kubelet[2897]: I1213 14:16:19.645775 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6e939e229ee8f0c14bbb6b1749827c57-kubeconfig\") pod \"kube-controller-manager-ip-172-31-24-217\" (UID: \"6e939e229ee8f0c14bbb6b1749827c57\") " pod="kube-system/kube-controller-manager-ip-172-31-24-217" Dec 13 14:16:19.646075 kubelet[2897]: I1213 14:16:19.646047 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/61ec8f35b47b95dcfe5a79b52992ae55-kubeconfig\") pod \"kube-scheduler-ip-172-31-24-217\" (UID: \"61ec8f35b47b95dcfe5a79b52992ae55\") " pod="kube-system/kube-scheduler-ip-172-31-24-217" Dec 13 14:16:19.646337 kubelet[2897]: I1213 14:16:19.646306 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/6e939e229ee8f0c14bbb6b1749827c57-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-24-217\" (UID: \"6e939e229ee8f0c14bbb6b1749827c57\") " pod="kube-system/kube-controller-manager-ip-172-31-24-217" Dec 13 14:16:19.646508 kubelet[2897]: I1213 14:16:19.646482 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6e939e229ee8f0c14bbb6b1749827c57-k8s-certs\") pod \"kube-controller-manager-ip-172-31-24-217\" (UID: \"6e939e229ee8f0c14bbb6b1749827c57\") " pod="kube-system/kube-controller-manager-ip-172-31-24-217" Dec 13 14:16:19.646661 kubelet[2897]: I1213 14:16:19.646636 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4e442ae8cb21488732c44336574a8944-ca-certs\") pod \"kube-apiserver-ip-172-31-24-217\" (UID: \"4e442ae8cb21488732c44336574a8944\") " pod="kube-system/kube-apiserver-ip-172-31-24-217" Dec 13 14:16:19.646820 kubelet[2897]: I1213 14:16:19.646786 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4e442ae8cb21488732c44336574a8944-k8s-certs\") pod \"kube-apiserver-ip-172-31-24-217\" (UID: \"4e442ae8cb21488732c44336574a8944\") " pod="kube-system/kube-apiserver-ip-172-31-24-217" Dec 13 14:16:19.646995 kubelet[2897]: I1213 14:16:19.646967 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4e442ae8cb21488732c44336574a8944-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-24-217\" (UID: \"4e442ae8cb21488732c44336574a8944\") " pod="kube-system/kube-apiserver-ip-172-31-24-217" Dec 13 14:16:19.647225 kubelet[2897]: I1213 14:16:19.647199 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6e939e229ee8f0c14bbb6b1749827c57-ca-certs\") pod \"kube-controller-manager-ip-172-31-24-217\" (UID: \"6e939e229ee8f0c14bbb6b1749827c57\") " pod="kube-system/kube-controller-manager-ip-172-31-24-217" Dec 13 14:16:19.647396 kubelet[2897]: I1213 14:16:19.647369 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6e939e229ee8f0c14bbb6b1749827c57-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-24-217\" (UID: \"6e939e229ee8f0c14bbb6b1749827c57\") " pod="kube-system/kube-controller-manager-ip-172-31-24-217" Dec 13 14:16:20.198974 kubelet[2897]: I1213 14:16:20.198930 2897 apiserver.go:52] "Watching apiserver" Dec 13 14:16:20.242142 kubelet[2897]: I1213 14:16:20.242034 2897 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 14:16:20.437862 kubelet[2897]: E1213 14:16:20.437731 2897 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-24-217\" already exists" pod="kube-system/kube-apiserver-ip-172-31-24-217" Dec 13 14:16:20.529371 kubelet[2897]: I1213 14:16:20.527992 2897 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-24-217" podStartSLOduration=1.527917349 podStartE2EDuration="1.527917349s" podCreationTimestamp="2024-12-13 14:16:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:16:20.48041093 +0000 UTC m=+1.460014293" watchObservedRunningTime="2024-12-13 14:16:20.527917349 +0000 UTC m=+1.507520712" Dec 13 14:16:20.556625 kubelet[2897]: I1213 14:16:20.556443 2897 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-24-217" podStartSLOduration=1.556420418 podStartE2EDuration="1.556420418s" podCreationTimestamp="2024-12-13 14:16:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:16:20.556363526 +0000 UTC m=+1.535966937" watchObservedRunningTime="2024-12-13 14:16:20.556420418 +0000 UTC m=+1.536023781" Dec 13 14:16:20.557551 kubelet[2897]: I1213 14:16:20.557377 2897 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-24-217" podStartSLOduration=1.557350572 podStartE2EDuration="1.557350572s" podCreationTimestamp="2024-12-13 14:16:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:16:20.528877239 +0000 UTC m=+1.508480602" watchObservedRunningTime="2024-12-13 14:16:20.557350572 +0000 UTC m=+1.536954043" Dec 13 14:16:24.629015 sudo[2096]: pam_unix(sudo:session): session closed for user root Dec 13 14:16:24.627000 audit[2096]: USER_END pid=2096 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:16:24.631047 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 14:16:24.631268 kernel: audit: type=1106 audit(1734099384.627:822): pid=2096 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:16:24.631000 audit[2096]: CRED_DISP pid=2096 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:16:24.655690 kernel: audit: type=1104 audit(1734099384.631:823): pid=2096 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:16:24.662457 sshd[2093]: pam_unix(sshd:session): session closed for user core Dec 13 14:16:24.664000 audit[2093]: USER_END pid=2093 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:24.665000 audit[2093]: CRED_DISP pid=2093 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:24.677995 systemd[1]: sshd@6-172.31.24.217:22-139.178.89.65:52148.service: Deactivated successfully. Dec 13 14:16:24.679604 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:16:24.679900 systemd[1]: session-7.scope: Consumed 11.564s CPU time. Dec 13 14:16:24.685863 kernel: audit: type=1106 audit(1734099384.664:824): pid=2093 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:24.686016 kernel: audit: type=1104 audit(1734099384.665:825): pid=2093 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:24.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.24.217:22-139.178.89.65:52148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:24.695247 kernel: audit: type=1131 audit(1734099384.676:826): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.24.217:22-139.178.89.65:52148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:24.695536 systemd-logind[1805]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:16:24.698334 systemd-logind[1805]: Removed session 7. Dec 13 14:16:27.515000 audit[2762]: AVC avc: denied { watch } for pid=2762 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:27.515000 audit[2762]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400118f280 a2=fc6 a3=0 items=0 ppid=2530 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:16:27.538044 kernel: audit: type=1400 audit(1734099387.515:827): avc: denied { watch } for pid=2762 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:27.538263 kernel: audit: type=1300 audit(1734099387.515:827): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400118f280 a2=fc6 a3=0 items=0 ppid=2530 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:16:27.515000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:16:27.548494 kernel: audit: type=1327 audit(1734099387.515:827): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:16:27.517000 audit[2762]: AVC avc: denied { watch } for pid=2762 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:27.559063 kernel: audit: type=1400 audit(1734099387.517:828): avc: denied { watch } for pid=2762 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:27.517000 audit[2762]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400118f580 a2=fc6 a3=0 items=0 ppid=2530 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:16:27.571573 kernel: audit: type=1300 audit(1734099387.517:828): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400118f580 a2=fc6 a3=0 items=0 ppid=2530 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:16:27.517000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:16:27.520000 audit[2762]: AVC avc: denied { watch } for pid=2762 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:27.520000 audit[2762]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400118f740 a2=fc6 a3=0 items=0 ppid=2530 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:16:27.520000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:16:27.522000 audit[2762]: AVC avc: denied { watch } for pid=2762 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:27.522000 audit[2762]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400118f900 a2=fc6 a3=0 items=0 ppid=2530 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:16:27.522000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:16:30.051000 audit[2762]: AVC avc: denied { watch } for pid=2762 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:16:30.054459 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:16:30.054643 kernel: audit: type=1400 audit(1734099390.051:831): avc: denied { watch } for pid=2762 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=520971 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:16:30.051000 audit[2762]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000bb1240 a2=fc6 a3=0 items=0 ppid=2530 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:16:30.076006 kernel: audit: type=1300 audit(1734099390.051:831): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000bb1240 a2=fc6 a3=0 items=0 ppid=2530 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:16:30.051000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:16:30.086402 kernel: audit: type=1327 audit(1734099390.051:831): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:16:31.019522 kubelet[2897]: I1213 14:16:31.019444 2897 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 14:16:31.022288 env[1824]: time="2024-12-13T14:16:31.022204673Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:16:31.024961 kubelet[2897]: I1213 14:16:31.024007 2897 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 14:16:31.286534 kubelet[2897]: I1213 14:16:31.286433 2897 topology_manager.go:215] "Topology Admit Handler" podUID="ad89d1d3-2090-451b-a792-dac4a843ac8a" podNamespace="kube-system" podName="kube-proxy-qd8pm" Dec 13 14:16:31.300030 systemd[1]: Created slice kubepods-besteffort-podad89d1d3_2090_451b_a792_dac4a843ac8a.slice. Dec 13 14:16:31.328362 kubelet[2897]: I1213 14:16:31.328297 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/ad89d1d3-2090-451b-a792-dac4a843ac8a-kube-proxy\") pod \"kube-proxy-qd8pm\" (UID: \"ad89d1d3-2090-451b-a792-dac4a843ac8a\") " pod="kube-system/kube-proxy-qd8pm" Dec 13 14:16:31.328544 kubelet[2897]: I1213 14:16:31.328369 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ad89d1d3-2090-451b-a792-dac4a843ac8a-lib-modules\") pod \"kube-proxy-qd8pm\" (UID: \"ad89d1d3-2090-451b-a792-dac4a843ac8a\") " pod="kube-system/kube-proxy-qd8pm" Dec 13 14:16:31.328544 kubelet[2897]: I1213 14:16:31.328422 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ad89d1d3-2090-451b-a792-dac4a843ac8a-xtables-lock\") pod \"kube-proxy-qd8pm\" (UID: \"ad89d1d3-2090-451b-a792-dac4a843ac8a\") " pod="kube-system/kube-proxy-qd8pm" Dec 13 14:16:31.328544 kubelet[2897]: I1213 14:16:31.328461 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gg2wk\" (UniqueName: \"kubernetes.io/projected/ad89d1d3-2090-451b-a792-dac4a843ac8a-kube-api-access-gg2wk\") pod \"kube-proxy-qd8pm\" (UID: \"ad89d1d3-2090-451b-a792-dac4a843ac8a\") " pod="kube-system/kube-proxy-qd8pm" Dec 13 14:16:31.444312 kubelet[2897]: E1213 14:16:31.444266 2897 projected.go:294] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found Dec 13 14:16:31.444561 kubelet[2897]: E1213 14:16:31.444525 2897 projected.go:200] Error preparing data for projected volume kube-api-access-gg2wk for pod kube-system/kube-proxy-qd8pm: configmap "kube-root-ca.crt" not found Dec 13 14:16:31.444857 kubelet[2897]: E1213 14:16:31.444821 2897 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/ad89d1d3-2090-451b-a792-dac4a843ac8a-kube-api-access-gg2wk podName:ad89d1d3-2090-451b-a792-dac4a843ac8a nodeName:}" failed. No retries permitted until 2024-12-13 14:16:31.944784988 +0000 UTC m=+12.924388339 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-gg2wk" (UniqueName: "kubernetes.io/projected/ad89d1d3-2090-451b-a792-dac4a843ac8a-kube-api-access-gg2wk") pod "kube-proxy-qd8pm" (UID: "ad89d1d3-2090-451b-a792-dac4a843ac8a") : configmap "kube-root-ca.crt" not found Dec 13 14:16:32.130737 kubelet[2897]: I1213 14:16:32.130644 2897 topology_manager.go:215] "Topology Admit Handler" podUID="23a9c64b-51af-40ab-8a76-fa596f8e79cc" podNamespace="tigera-operator" podName="tigera-operator-7bc55997bb-4gjf6" Dec 13 14:16:32.143849 systemd[1]: Created slice kubepods-besteffort-pod23a9c64b_51af_40ab_8a76_fa596f8e79cc.slice. Dec 13 14:16:32.215036 env[1824]: time="2024-12-13T14:16:32.214295938Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-qd8pm,Uid:ad89d1d3-2090-451b-a792-dac4a843ac8a,Namespace:kube-system,Attempt:0,}" Dec 13 14:16:32.240905 kubelet[2897]: I1213 14:16:32.240832 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/23a9c64b-51af-40ab-8a76-fa596f8e79cc-var-lib-calico\") pod \"tigera-operator-7bc55997bb-4gjf6\" (UID: \"23a9c64b-51af-40ab-8a76-fa596f8e79cc\") " pod="tigera-operator/tigera-operator-7bc55997bb-4gjf6" Dec 13 14:16:32.241231 kubelet[2897]: I1213 14:16:32.241163 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nkgr2\" (UniqueName: \"kubernetes.io/projected/23a9c64b-51af-40ab-8a76-fa596f8e79cc-kube-api-access-nkgr2\") pod \"tigera-operator-7bc55997bb-4gjf6\" (UID: \"23a9c64b-51af-40ab-8a76-fa596f8e79cc\") " pod="tigera-operator/tigera-operator-7bc55997bb-4gjf6" Dec 13 14:16:32.251581 env[1824]: time="2024-12-13T14:16:32.251432621Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:16:32.251581 env[1824]: time="2024-12-13T14:16:32.251521853Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:16:32.252420 env[1824]: time="2024-12-13T14:16:32.251549765Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:16:32.252638 env[1824]: time="2024-12-13T14:16:32.252561340Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a0d7f61cd8f17336213e6b64702b6ebd53668e31749173b8cdf384145f57d3ca pid=2981 runtime=io.containerd.runc.v2 Dec 13 14:16:32.297896 systemd[1]: Started cri-containerd-a0d7f61cd8f17336213e6b64702b6ebd53668e31749173b8cdf384145f57d3ca.scope. Dec 13 14:16:32.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.347730 kernel: audit: type=1400 audit(1734099392.330:832): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.347956 kernel: audit: type=1400 audit(1734099392.330:833): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.356080 kernel: audit: type=1400 audit(1734099392.330:834): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.365249 kernel: audit: type=1400 audit(1734099392.330:835): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.380773 kernel: audit: type=1400 audit(1734099392.330:836): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.381027 kernel: audit: type=1400 audit(1734099392.330:837): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.393655 kernel: audit: type=1400 audit(1734099392.330:838): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.331000 audit: BPF prog-id=109 op=LOAD Dec 13 14:16:32.332000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.332000 audit[2992]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2981 pid=2992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130643766363163643866313733333632313365366236343730326236 Dec 13 14:16:32.332000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.332000 audit[2992]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2981 pid=2992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130643766363163643866313733333632313365366236343730326236 Dec 13 14:16:32.333000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.333000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.333000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.333000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.333000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.333000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.333000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.333000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.333000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.333000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.333000 audit: BPF prog-id=110 op=LOAD Dec 13 14:16:32.333000 audit[2992]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2981 pid=2992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130643766363163643866313733333632313365366236343730326236 Dec 13 14:16:32.339000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.339000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.339000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.339000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.339000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.339000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.339000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.339000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.339000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.339000 audit: BPF prog-id=111 op=LOAD Dec 13 14:16:32.339000 audit[2992]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2981 pid=2992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130643766363163643866313733333632313365366236343730326236 Dec 13 14:16:32.347000 audit: BPF prog-id=111 op=UNLOAD Dec 13 14:16:32.349000 audit: BPF prog-id=110 op=UNLOAD Dec 13 14:16:32.349000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.349000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.349000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.349000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.349000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.349000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.349000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.349000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.349000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.349000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.349000 audit: BPF prog-id=112 op=LOAD Dec 13 14:16:32.349000 audit[2992]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2981 pid=2992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130643766363163643866313733333632313365366236343730326236 Dec 13 14:16:32.425472 env[1824]: time="2024-12-13T14:16:32.425411913Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-qd8pm,Uid:ad89d1d3-2090-451b-a792-dac4a843ac8a,Namespace:kube-system,Attempt:0,} returns sandbox id \"a0d7f61cd8f17336213e6b64702b6ebd53668e31749173b8cdf384145f57d3ca\"" Dec 13 14:16:32.435727 env[1824]: time="2024-12-13T14:16:32.435029684Z" level=info msg="CreateContainer within sandbox \"a0d7f61cd8f17336213e6b64702b6ebd53668e31749173b8cdf384145f57d3ca\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:16:32.450099 env[1824]: time="2024-12-13T14:16:32.450042046Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-4gjf6,Uid:23a9c64b-51af-40ab-8a76-fa596f8e79cc,Namespace:tigera-operator,Attempt:0,}" Dec 13 14:16:32.471963 env[1824]: time="2024-12-13T14:16:32.471893487Z" level=info msg="CreateContainer within sandbox \"a0d7f61cd8f17336213e6b64702b6ebd53668e31749173b8cdf384145f57d3ca\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"b8dcef1db278380101e2f19acd87b0aba9a0d1daf5dcbb1142e06ed45aa29fe2\"" Dec 13 14:16:32.476280 env[1824]: time="2024-12-13T14:16:32.476125569Z" level=info msg="StartContainer for \"b8dcef1db278380101e2f19acd87b0aba9a0d1daf5dcbb1142e06ed45aa29fe2\"" Dec 13 14:16:32.507302 env[1824]: time="2024-12-13T14:16:32.507151981Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:16:32.507302 env[1824]: time="2024-12-13T14:16:32.507233509Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:16:32.507302 env[1824]: time="2024-12-13T14:16:32.507261133Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:16:32.508005 env[1824]: time="2024-12-13T14:16:32.507856764Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f8323b93dc33af4335053e3a614475ea485ce7721130f4fe4c00715c94fb463f pid=3033 runtime=io.containerd.runc.v2 Dec 13 14:16:32.528928 systemd[1]: Started cri-containerd-b8dcef1db278380101e2f19acd87b0aba9a0d1daf5dcbb1142e06ed45aa29fe2.scope. Dec 13 14:16:32.561933 systemd[1]: Started cri-containerd-f8323b93dc33af4335053e3a614475ea485ce7721130f4fe4c00715c94fb463f.scope. Dec 13 14:16:32.607000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.607000 audit[3032]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2981 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.611000 audit: BPF prog-id=113 op=LOAD Dec 13 14:16:32.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238646365663164623237383338303130316532663139616364383762 Dec 13 14:16:32.612000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.612000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3033 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638333233623933646333336166343333353035336533613631343437 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3033 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638333233623933646333336166343333353035336533613631343437 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit: BPF prog-id=114 op=LOAD Dec 13 14:16:32.613000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3033 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638333233623933646333336166343333353035336533613631343437 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit: BPF prog-id=115 op=LOAD Dec 13 14:16:32.613000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3033 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638333233623933646333336166343333353035336533613631343437 Dec 13 14:16:32.613000 audit: BPF prog-id=115 op=UNLOAD Dec 13 14:16:32.613000 audit: BPF prog-id=114 op=UNLOAD Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.613000 audit: BPF prog-id=116 op=LOAD Dec 13 14:16:32.613000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3033 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638333233623933646333336166343333353035336533613631343437 Dec 13 14:16:32.617000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.617000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.617000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.617000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.617000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.617000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.617000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.617000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.617000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.617000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.617000 audit: BPF prog-id=117 op=LOAD Dec 13 14:16:32.617000 audit[3032]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2981 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238646365663164623237383338303130316532663139616364383762 Dec 13 14:16:32.620000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.620000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.620000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.620000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.620000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.620000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.620000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.620000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.620000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.620000 audit: BPF prog-id=118 op=LOAD Dec 13 14:16:32.620000 audit[3032]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2981 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238646365663164623237383338303130316532663139616364383762 Dec 13 14:16:32.622000 audit: BPF prog-id=118 op=UNLOAD Dec 13 14:16:32.622000 audit: BPF prog-id=117 op=UNLOAD Dec 13 14:16:32.622000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.622000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.622000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.622000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.622000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.622000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.622000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.622000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.622000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.622000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.622000 audit: BPF prog-id=119 op=LOAD Dec 13 14:16:32.622000 audit[3032]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2981 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238646365663164623237383338303130316532663139616364383762 Dec 13 14:16:32.682996 env[1824]: time="2024-12-13T14:16:32.682831022Z" level=info msg="StartContainer for \"b8dcef1db278380101e2f19acd87b0aba9a0d1daf5dcbb1142e06ed45aa29fe2\" returns successfully" Dec 13 14:16:32.705953 env[1824]: time="2024-12-13T14:16:32.705889997Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-4gjf6,Uid:23a9c64b-51af-40ab-8a76-fa596f8e79cc,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"f8323b93dc33af4335053e3a614475ea485ce7721130f4fe4c00715c94fb463f\"" Dec 13 14:16:32.709669 env[1824]: time="2024-12-13T14:16:32.709604616Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 14:16:32.852000 audit[3119]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=3119 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:32.852000 audit[3119]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc94f26b0 a2=0 a3=1 items=0 ppid=3062 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.852000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:16:32.859000 audit[3120]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=3120 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:32.859000 audit[3120]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc201b370 a2=0 a3=1 items=0 ppid=3062 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.859000 audit[3122]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=3122 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:32.859000 audit[3122]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd9fa5340 a2=0 a3=1 items=0 ppid=3062 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.859000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:16:32.859000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:16:32.862000 audit[3123]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=3123 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:32.862000 audit[3123]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffffcdd600 a2=0 a3=1 items=0 ppid=3062 pid=3123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.862000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:16:32.865000 audit[3124]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=3124 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:32.865000 audit[3124]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe1175e20 a2=0 a3=1 items=0 ppid=3062 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.865000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:16:32.868000 audit[3125]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=3125 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:32.868000 audit[3125]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe378dd30 a2=0 a3=1 items=0 ppid=3062 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.868000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:16:32.954000 audit[3126]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=3126 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:32.954000 audit[3126]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc1719420 a2=0 a3=1 items=0 ppid=3062 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.954000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:16:32.962000 audit[3128]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=3128 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:32.962000 audit[3128]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffff587ed10 a2=0 a3=1 items=0 ppid=3062 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.962000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:16:32.972000 audit[3131]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=3131 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:32.972000 audit[3131]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd15d98e0 a2=0 a3=1 items=0 ppid=3062 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.972000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:16:32.977000 audit[3132]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=3132 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:32.977000 audit[3132]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd83dbb90 a2=0 a3=1 items=0 ppid=3062 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.977000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:16:32.986000 audit[3134]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=3134 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:32.986000 audit[3134]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc5699dc0 a2=0 a3=1 items=0 ppid=3062 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.986000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:16:32.989000 audit[3135]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=3135 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:32.989000 audit[3135]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff85bb670 a2=0 a3=1 items=0 ppid=3062 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.989000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:16:32.996000 audit[3137]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=3137 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:32.996000 audit[3137]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff7cb0040 a2=0 a3=1 items=0 ppid=3062 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:32.996000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:16:33.005000 audit[3140]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=3140 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:33.005000 audit[3140]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe277afb0 a2=0 a3=1 items=0 ppid=3062 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.005000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:16:33.012000 audit[3141]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=3141 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:33.012000 audit[3141]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffcbaa030 a2=0 a3=1 items=0 ppid=3062 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.012000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:16:33.019000 audit[3143]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=3143 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:33.019000 audit[3143]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff3b73a00 a2=0 a3=1 items=0 ppid=3062 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.019000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:16:33.023000 audit[3144]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=3144 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:33.023000 audit[3144]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff89bea80 a2=0 a3=1 items=0 ppid=3062 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.023000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:16:33.030000 audit[3146]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=3146 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:33.030000 audit[3146]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc220b8d0 a2=0 a3=1 items=0 ppid=3062 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.030000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:16:33.050137 systemd[1]: run-containerd-runc-k8s.io-a0d7f61cd8f17336213e6b64702b6ebd53668e31749173b8cdf384145f57d3ca-runc.pcG6in.mount: Deactivated successfully. Dec 13 14:16:33.055000 audit[3149]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3149 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:33.055000 audit[3149]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe98d7310 a2=0 a3=1 items=0 ppid=3062 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.055000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:16:33.066000 audit[3152]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3152 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:33.066000 audit[3152]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdc1a8670 a2=0 a3=1 items=0 ppid=3062 pid=3152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.066000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:16:33.069000 audit[3153]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3153 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:33.069000 audit[3153]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdf23e8b0 a2=0 a3=1 items=0 ppid=3062 pid=3153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.069000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:16:33.076000 audit[3155]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3155 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:33.076000 audit[3155]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffe5377be0 a2=0 a3=1 items=0 ppid=3062 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.076000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:16:33.087000 audit[3158]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3158 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:33.087000 audit[3158]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff4be3f60 a2=0 a3=1 items=0 ppid=3062 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.087000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:16:33.090000 audit[3159]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3159 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:33.090000 audit[3159]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff9c17b40 a2=0 a3=1 items=0 ppid=3062 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.090000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:16:33.097000 audit[3161]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3161 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:33.097000 audit[3161]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffd9bb6110 a2=0 a3=1 items=0 ppid=3062 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.097000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:16:33.152000 audit[3167]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3167 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:33.152000 audit[3167]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffc9900140 a2=0 a3=1 items=0 ppid=3062 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.152000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:33.169000 audit[3167]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3167 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:33.169000 audit[3167]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffc9900140 a2=0 a3=1 items=0 ppid=3062 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.169000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:33.177000 audit[3172]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3172 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:33.177000 audit[3172]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffea959e00 a2=0 a3=1 items=0 ppid=3062 pid=3172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.177000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:16:33.186000 audit[3174]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3174 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:33.186000 audit[3174]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe22f0480 a2=0 a3=1 items=0 ppid=3062 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.186000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:16:33.194000 audit[3177]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3177 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:33.194000 audit[3177]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff34d8810 a2=0 a3=1 items=0 ppid=3062 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.194000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:16:33.196000 audit[3178]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3178 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:33.196000 audit[3178]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcf68dd50 a2=0 a3=1 items=0 ppid=3062 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.196000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:16:33.202000 audit[3180]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3180 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:33.202000 audit[3180]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe36511c0 a2=0 a3=1 items=0 ppid=3062 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.202000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:16:33.205000 audit[3181]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3181 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:33.205000 audit[3181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc5866320 a2=0 a3=1 items=0 ppid=3062 pid=3181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.205000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:16:33.226000 audit[3183]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3183 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:33.226000 audit[3183]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd61c6370 a2=0 a3=1 items=0 ppid=3062 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.226000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:16:33.241000 audit[3186]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3186 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:33.241000 audit[3186]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffe4e17ab0 a2=0 a3=1 items=0 ppid=3062 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.241000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:16:33.247000 audit[3187]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3187 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:33.247000 audit[3187]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe046cd70 a2=0 a3=1 items=0 ppid=3062 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.247000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:16:33.255000 audit[3189]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3189 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:33.255000 audit[3189]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd6076670 a2=0 a3=1 items=0 ppid=3062 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.255000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:16:33.258000 audit[3190]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3190 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:33.258000 audit[3190]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc075cb90 a2=0 a3=1 items=0 ppid=3062 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.258000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:16:33.265000 audit[3192]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3192 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:33.265000 audit[3192]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc072a3d0 a2=0 a3=1 items=0 ppid=3062 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.265000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:16:33.274000 audit[3195]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3195 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:33.274000 audit[3195]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc78d9180 a2=0 a3=1 items=0 ppid=3062 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.274000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:16:33.283000 audit[3198]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3198 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:33.283000 audit[3198]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe577e7f0 a2=0 a3=1 items=0 ppid=3062 pid=3198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.283000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:16:33.286000 audit[3199]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3199 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:33.286000 audit[3199]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe22282e0 a2=0 a3=1 items=0 ppid=3062 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.286000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:16:33.292000 audit[3201]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3201 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:33.292000 audit[3201]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffff48c7fe0 a2=0 a3=1 items=0 ppid=3062 pid=3201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.292000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:16:33.299000 audit[3204]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3204 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:33.299000 audit[3204]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc32c2ae0 a2=0 a3=1 items=0 ppid=3062 pid=3204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.299000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:16:33.302000 audit[3205]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3205 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:33.302000 audit[3205]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffea01f1a0 a2=0 a3=1 items=0 ppid=3062 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.302000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:16:33.308000 audit[3207]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3207 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:33.308000 audit[3207]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffdec3c360 a2=0 a3=1 items=0 ppid=3062 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.308000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:16:33.310000 audit[3208]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3208 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:33.310000 audit[3208]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffffd16760 a2=0 a3=1 items=0 ppid=3062 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.310000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:16:33.316000 audit[3210]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3210 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:33.316000 audit[3210]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe46271d0 a2=0 a3=1 items=0 ppid=3062 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.316000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:16:33.327000 audit[3213]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3213 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:33.327000 audit[3213]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffd459dc0 a2=0 a3=1 items=0 ppid=3062 pid=3213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.327000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:16:33.337000 audit[3215]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3215 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:16:33.337000 audit[3215]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=fffff7d21ab0 a2=0 a3=1 items=0 ppid=3062 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.337000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:33.338000 audit[3215]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3215 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:16:33.338000 audit[3215]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=fffff7d21ab0 a2=0 a3=1 items=0 ppid=3062 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.338000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:35.504551 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3021044985.mount: Deactivated successfully. Dec 13 14:16:36.991479 env[1824]: time="2024-12-13T14:16:36.991414991Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:36.994881 env[1824]: time="2024-12-13T14:16:36.994812211Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:30d521e4e84764b396aacbb2a373ca7a573f84571e3955b34329652acccfb73c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:36.998395 env[1824]: time="2024-12-13T14:16:36.998341238Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:37.003718 env[1824]: time="2024-12-13T14:16:37.003593140Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:37.007272 env[1824]: time="2024-12-13T14:16:37.005893849Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:30d521e4e84764b396aacbb2a373ca7a573f84571e3955b34329652acccfb73c\"" Dec 13 14:16:37.019922 env[1824]: time="2024-12-13T14:16:37.019785464Z" level=info msg="CreateContainer within sandbox \"f8323b93dc33af4335053e3a614475ea485ce7721130f4fe4c00715c94fb463f\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 14:16:37.045948 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3880435856.mount: Deactivated successfully. Dec 13 14:16:37.059333 env[1824]: time="2024-12-13T14:16:37.059226307Z" level=info msg="CreateContainer within sandbox \"f8323b93dc33af4335053e3a614475ea485ce7721130f4fe4c00715c94fb463f\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"38dff614c58114000c3bbf34764151deb1da6d3a4cbe0f3863243a9148d9dffe\"" Dec 13 14:16:37.063234 env[1824]: time="2024-12-13T14:16:37.063169430Z" level=info msg="StartContainer for \"38dff614c58114000c3bbf34764151deb1da6d3a4cbe0f3863243a9148d9dffe\"" Dec 13 14:16:37.107175 systemd[1]: Started cri-containerd-38dff614c58114000c3bbf34764151deb1da6d3a4cbe0f3863243a9148d9dffe.scope. Dec 13 14:16:37.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.158834 kernel: kauditd_printk_skb: 303 callbacks suppressed Dec 13 14:16:37.158921 kernel: audit: type=1400 audit(1734099397.155:925): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.179708 kernel: audit: type=1400 audit(1734099397.163:926): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.179844 kernel: audit: type=1400 audit(1734099397.163:927): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.190142 kernel: audit: type=1400 audit(1734099397.163:928): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.198739 kernel: audit: type=1400 audit(1734099397.163:929): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.206164 kernel: audit: type=1400 audit(1734099397.163:930): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.215148 kernel: audit: type=1400 audit(1734099397.163:931): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.223204 kernel: audit: type=1400 audit(1734099397.163:932): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.230865 kernel: audit: type=1400 audit(1734099397.163:933): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.243970 kernel: audit: type=1400 audit(1734099397.165:934): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.165000 audit: BPF prog-id=120 op=LOAD Dec 13 14:16:37.165000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.165000 audit[3224]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=3033 pid=3224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:37.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338646666363134633538313134303030633362626633343736343135 Dec 13 14:16:37.165000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.165000 audit[3224]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3033 pid=3224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:37.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338646666363134633538313134303030633362626633343736343135 Dec 13 14:16:37.165000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.165000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.165000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.165000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.165000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.165000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.165000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.165000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.165000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.165000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.165000 audit: BPF prog-id=121 op=LOAD Dec 13 14:16:37.165000 audit[3224]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=3033 pid=3224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:37.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338646666363134633538313134303030633362626633343736343135 Dec 13 14:16:37.179000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.179000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.179000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.179000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.179000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.179000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.179000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.179000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.179000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.179000 audit: BPF prog-id=122 op=LOAD Dec 13 14:16:37.179000 audit[3224]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=3033 pid=3224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:37.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338646666363134633538313134303030633362626633343736343135 Dec 13 14:16:37.179000 audit: BPF prog-id=122 op=UNLOAD Dec 13 14:16:37.179000 audit: BPF prog-id=121 op=UNLOAD Dec 13 14:16:37.179000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.179000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.179000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.179000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.179000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.179000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.179000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.179000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.179000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.179000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:37.179000 audit: BPF prog-id=123 op=LOAD Dec 13 14:16:37.179000 audit[3224]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=3033 pid=3224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:37.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338646666363134633538313134303030633362626633343736343135 Dec 13 14:16:37.264217 env[1824]: time="2024-12-13T14:16:37.264140237Z" level=info msg="StartContainer for \"38dff614c58114000c3bbf34764151deb1da6d3a4cbe0f3863243a9148d9dffe\" returns successfully" Dec 13 14:16:37.498399 kubelet[2897]: I1213 14:16:37.498100 2897 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-qd8pm" podStartSLOduration=6.498068235 podStartE2EDuration="6.498068235s" podCreationTimestamp="2024-12-13 14:16:31 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:16:33.477147614 +0000 UTC m=+14.456750965" watchObservedRunningTime="2024-12-13 14:16:37.498068235 +0000 UTC m=+18.477671586" Dec 13 14:16:38.036299 systemd[1]: run-containerd-runc-k8s.io-38dff614c58114000c3bbf34764151deb1da6d3a4cbe0f3863243a9148d9dffe-runc.Ee07VX.mount: Deactivated successfully. Dec 13 14:16:39.352268 kubelet[2897]: I1213 14:16:39.352159 2897 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7bc55997bb-4gjf6" podStartSLOduration=3.051172518 podStartE2EDuration="7.352102024s" podCreationTimestamp="2024-12-13 14:16:32 +0000 UTC" firstStartedPulling="2024-12-13 14:16:32.708542762 +0000 UTC m=+13.688146125" lastFinishedPulling="2024-12-13 14:16:37.00947228 +0000 UTC m=+17.989075631" observedRunningTime="2024-12-13 14:16:37.503213144 +0000 UTC m=+18.482816531" watchObservedRunningTime="2024-12-13 14:16:39.352102024 +0000 UTC m=+20.331705375" Dec 13 14:16:41.864000 audit[3256]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3256 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:41.864000 audit[3256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=fffff9892770 a2=0 a3=1 items=0 ppid=3062 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:41.864000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:41.867000 audit[3256]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3256 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:41.867000 audit[3256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff9892770 a2=0 a3=1 items=0 ppid=3062 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:41.867000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:41.885000 audit[3258]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3258 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:41.885000 audit[3258]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffc38f4ef0 a2=0 a3=1 items=0 ppid=3062 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:41.885000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:41.891000 audit[3258]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3258 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:41.891000 audit[3258]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc38f4ef0 a2=0 a3=1 items=0 ppid=3062 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:41.891000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:42.048590 kubelet[2897]: I1213 14:16:42.048522 2897 topology_manager.go:215] "Topology Admit Handler" podUID="792ffb46-6406-427d-89e0-8fdac7633da5" podNamespace="calico-system" podName="calico-typha-57b467f8fb-gkq82" Dec 13 14:16:42.064667 systemd[1]: Created slice kubepods-besteffort-pod792ffb46_6406_427d_89e0_8fdac7633da5.slice. Dec 13 14:16:42.113434 kubelet[2897]: I1213 14:16:42.113376 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/792ffb46-6406-427d-89e0-8fdac7633da5-tigera-ca-bundle\") pod \"calico-typha-57b467f8fb-gkq82\" (UID: \"792ffb46-6406-427d-89e0-8fdac7633da5\") " pod="calico-system/calico-typha-57b467f8fb-gkq82" Dec 13 14:16:42.114057 kubelet[2897]: I1213 14:16:42.113992 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5xxlt\" (UniqueName: \"kubernetes.io/projected/792ffb46-6406-427d-89e0-8fdac7633da5-kube-api-access-5xxlt\") pod \"calico-typha-57b467f8fb-gkq82\" (UID: \"792ffb46-6406-427d-89e0-8fdac7633da5\") " pod="calico-system/calico-typha-57b467f8fb-gkq82" Dec 13 14:16:42.114564 kubelet[2897]: I1213 14:16:42.114500 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/792ffb46-6406-427d-89e0-8fdac7633da5-typha-certs\") pod \"calico-typha-57b467f8fb-gkq82\" (UID: \"792ffb46-6406-427d-89e0-8fdac7633da5\") " pod="calico-system/calico-typha-57b467f8fb-gkq82" Dec 13 14:16:42.375053 env[1824]: time="2024-12-13T14:16:42.373717836Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-57b467f8fb-gkq82,Uid:792ffb46-6406-427d-89e0-8fdac7633da5,Namespace:calico-system,Attempt:0,}" Dec 13 14:16:42.430136 env[1824]: time="2024-12-13T14:16:42.428600292Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:16:42.430136 env[1824]: time="2024-12-13T14:16:42.428679180Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:16:42.430136 env[1824]: time="2024-12-13T14:16:42.428706360Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:16:42.430769 env[1824]: time="2024-12-13T14:16:42.430666713Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f34e508b03d7edd8bda0f19721c2a4a01430154fd73bb1c2130f2714b71fa82b pid=3269 runtime=io.containerd.runc.v2 Dec 13 14:16:42.442844 kubelet[2897]: I1213 14:16:42.441513 2897 topology_manager.go:215] "Topology Admit Handler" podUID="82f6882e-edde-42fc-9640-19b56534d09c" podNamespace="calico-system" podName="calico-node-rnv2r" Dec 13 14:16:42.466557 systemd[1]: Created slice kubepods-besteffort-pod82f6882e_edde_42fc_9640_19b56534d09c.slice. Dec 13 14:16:42.500289 systemd[1]: Started cri-containerd-f34e508b03d7edd8bda0f19721c2a4a01430154fd73bb1c2130f2714b71fa82b.scope. Dec 13 14:16:42.518715 kubelet[2897]: I1213 14:16:42.517933 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/82f6882e-edde-42fc-9640-19b56534d09c-lib-modules\") pod \"calico-node-rnv2r\" (UID: \"82f6882e-edde-42fc-9640-19b56534d09c\") " pod="calico-system/calico-node-rnv2r" Dec 13 14:16:42.518715 kubelet[2897]: I1213 14:16:42.518009 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/82f6882e-edde-42fc-9640-19b56534d09c-node-certs\") pod \"calico-node-rnv2r\" (UID: \"82f6882e-edde-42fc-9640-19b56534d09c\") " pod="calico-system/calico-node-rnv2r" Dec 13 14:16:42.518715 kubelet[2897]: I1213 14:16:42.518046 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/82f6882e-edde-42fc-9640-19b56534d09c-cni-log-dir\") pod \"calico-node-rnv2r\" (UID: \"82f6882e-edde-42fc-9640-19b56534d09c\") " pod="calico-system/calico-node-rnv2r" Dec 13 14:16:42.518715 kubelet[2897]: I1213 14:16:42.518083 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/82f6882e-edde-42fc-9640-19b56534d09c-flexvol-driver-host\") pod \"calico-node-rnv2r\" (UID: \"82f6882e-edde-42fc-9640-19b56534d09c\") " pod="calico-system/calico-node-rnv2r" Dec 13 14:16:42.518715 kubelet[2897]: I1213 14:16:42.518154 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/82f6882e-edde-42fc-9640-19b56534d09c-cni-bin-dir\") pod \"calico-node-rnv2r\" (UID: \"82f6882e-edde-42fc-9640-19b56534d09c\") " pod="calico-system/calico-node-rnv2r" Dec 13 14:16:42.519410 kubelet[2897]: I1213 14:16:42.518195 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/82f6882e-edde-42fc-9640-19b56534d09c-policysync\") pod \"calico-node-rnv2r\" (UID: \"82f6882e-edde-42fc-9640-19b56534d09c\") " pod="calico-system/calico-node-rnv2r" Dec 13 14:16:42.519410 kubelet[2897]: I1213 14:16:42.518235 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/82f6882e-edde-42fc-9640-19b56534d09c-tigera-ca-bundle\") pod \"calico-node-rnv2r\" (UID: \"82f6882e-edde-42fc-9640-19b56534d09c\") " pod="calico-system/calico-node-rnv2r" Dec 13 14:16:42.519410 kubelet[2897]: I1213 14:16:42.518277 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/82f6882e-edde-42fc-9640-19b56534d09c-var-lib-calico\") pod \"calico-node-rnv2r\" (UID: \"82f6882e-edde-42fc-9640-19b56534d09c\") " pod="calico-system/calico-node-rnv2r" Dec 13 14:16:42.519410 kubelet[2897]: I1213 14:16:42.518316 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/82f6882e-edde-42fc-9640-19b56534d09c-xtables-lock\") pod \"calico-node-rnv2r\" (UID: \"82f6882e-edde-42fc-9640-19b56534d09c\") " pod="calico-system/calico-node-rnv2r" Dec 13 14:16:42.519410 kubelet[2897]: I1213 14:16:42.518352 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qdmjf\" (UniqueName: \"kubernetes.io/projected/82f6882e-edde-42fc-9640-19b56534d09c-kube-api-access-qdmjf\") pod \"calico-node-rnv2r\" (UID: \"82f6882e-edde-42fc-9640-19b56534d09c\") " pod="calico-system/calico-node-rnv2r" Dec 13 14:16:42.519880 kubelet[2897]: I1213 14:16:42.518393 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/82f6882e-edde-42fc-9640-19b56534d09c-var-run-calico\") pod \"calico-node-rnv2r\" (UID: \"82f6882e-edde-42fc-9640-19b56534d09c\") " pod="calico-system/calico-node-rnv2r" Dec 13 14:16:42.519880 kubelet[2897]: I1213 14:16:42.518435 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/82f6882e-edde-42fc-9640-19b56534d09c-cni-net-dir\") pod \"calico-node-rnv2r\" (UID: \"82f6882e-edde-42fc-9640-19b56534d09c\") " pod="calico-system/calico-node-rnv2r" Dec 13 14:16:42.627694 kubelet[2897]: E1213 14:16:42.627481 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.627914 kubelet[2897]: W1213 14:16:42.627878 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.628180 kubelet[2897]: E1213 14:16:42.628081 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.633726 kubelet[2897]: E1213 14:16:42.633675 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.634055 kubelet[2897]: W1213 14:16:42.633994 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.634342 kubelet[2897]: E1213 14:16:42.634292 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.652451 kubelet[2897]: E1213 14:16:42.652403 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.652741 kubelet[2897]: W1213 14:16:42.652700 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.652968 kubelet[2897]: E1213 14:16:42.652925 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.746232 kernel: kauditd_printk_skb: 59 callbacks suppressed Dec 13 14:16:42.746408 kernel: audit: type=1400 audit(1734099402.736:947): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.760352 kubelet[2897]: I1213 14:16:42.760297 2897 topology_manager.go:215] "Topology Admit Handler" podUID="7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c" podNamespace="calico-system" podName="csi-node-driver-jcqpr" Dec 13 14:16:42.761098 kubelet[2897]: E1213 14:16:42.761037 2897 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jcqpr" podUID="7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c" Dec 13 14:16:42.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.768066 kernel: audit: type=1400 audit(1734099402.736:948): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.768285 kernel: audit: type=1400 audit(1734099402.736:949): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.775846 kernel: audit: type=1400 audit(1734099402.736:950): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.777850 env[1824]: time="2024-12-13T14:16:42.777342826Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rnv2r,Uid:82f6882e-edde-42fc-9640-19b56534d09c,Namespace:calico-system,Attempt:0,}" Dec 13 14:16:42.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.786582 kernel: audit: type=1400 audit(1734099402.736:951): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.789246 kernel: audit: type=1400 audit(1734099402.736:952): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.805317 kubelet[2897]: E1213 14:16:42.805275 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.805525 kubelet[2897]: W1213 14:16:42.805495 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.805709 kubelet[2897]: E1213 14:16:42.805682 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.806329 kernel: audit: type=1400 audit(1734099402.736:953): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.808670 kubelet[2897]: E1213 14:16:42.808610 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.808902 kubelet[2897]: W1213 14:16:42.808870 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.809096 kubelet[2897]: E1213 14:16:42.809069 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.810327 kubelet[2897]: E1213 14:16:42.810294 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.810491 kubelet[2897]: W1213 14:16:42.810463 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.810646 kubelet[2897]: E1213 14:16:42.810621 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.816971 kernel: audit: type=1400 audit(1734099402.736:954): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.820385 kubelet[2897]: E1213 14:16:42.819892 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.820385 kubelet[2897]: W1213 14:16:42.819925 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.820385 kubelet[2897]: E1213 14:16:42.819963 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.822933 kubelet[2897]: E1213 14:16:42.820770 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.822933 kubelet[2897]: W1213 14:16:42.820815 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.822933 kubelet[2897]: E1213 14:16:42.820845 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.823677 kubelet[2897]: E1213 14:16:42.823266 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.823677 kubelet[2897]: W1213 14:16:42.823298 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.823677 kubelet[2897]: E1213 14:16:42.823331 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.824355 kubelet[2897]: E1213 14:16:42.823999 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.824355 kubelet[2897]: W1213 14:16:42.824024 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.824355 kubelet[2897]: E1213 14:16:42.824048 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.824872 kubelet[2897]: E1213 14:16:42.824636 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.824872 kubelet[2897]: W1213 14:16:42.824658 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.824872 kubelet[2897]: E1213 14:16:42.824680 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.825398 kubelet[2897]: E1213 14:16:42.825361 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.825526 kubelet[2897]: W1213 14:16:42.825501 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.825641 kubelet[2897]: E1213 14:16:42.825617 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.826162 kubelet[2897]: E1213 14:16:42.826091 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.826310 kubelet[2897]: W1213 14:16:42.826284 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.826453 kubelet[2897]: E1213 14:16:42.826428 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.826903 kubelet[2897]: E1213 14:16:42.826864 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.827039 kubelet[2897]: W1213 14:16:42.827014 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.827185 kubelet[2897]: E1213 14:16:42.827157 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.827608 kubelet[2897]: E1213 14:16:42.827573 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.827742 kubelet[2897]: W1213 14:16:42.827718 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.827925 kubelet[2897]: E1213 14:16:42.827901 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.828507 kernel: audit: type=1400 audit(1734099402.736:955): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.835882 kubelet[2897]: E1213 14:16:42.835848 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.836074 kubelet[2897]: W1213 14:16:42.836041 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.836272 kubelet[2897]: E1213 14:16:42.836241 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.839864 kernel: audit: type=1400 audit(1734099402.738:956): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.841756 env[1824]: time="2024-12-13T14:16:42.841621571Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:16:42.738000 audit: BPF prog-id=124 op=LOAD Dec 13 14:16:42.745000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.745000 audit[3277]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3269 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:42.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633346535303862303364376564643862646130663139373231633261 Dec 13 14:16:42.745000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.745000 audit[3277]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3269 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:42.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633346535303862303364376564643862646130663139373231633261 Dec 13 14:16:42.745000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.745000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.745000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.745000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.745000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.745000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.745000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.745000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.745000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.745000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.745000 audit: BPF prog-id=125 op=LOAD Dec 13 14:16:42.745000 audit[3277]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3269 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:42.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633346535303862303364376564643862646130663139373231633261 Dec 13 14:16:42.746000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.746000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.746000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.746000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.746000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.746000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.746000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.746000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.746000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.746000 audit: BPF prog-id=126 op=LOAD Dec 13 14:16:42.746000 audit[3277]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3269 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:42.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633346535303862303364376564643862646130663139373231633261 Dec 13 14:16:42.746000 audit: BPF prog-id=126 op=UNLOAD Dec 13 14:16:42.746000 audit: BPF prog-id=125 op=UNLOAD Dec 13 14:16:42.746000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.746000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.746000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.746000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.746000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.746000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.746000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.746000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.746000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.746000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.746000 audit: BPF prog-id=127 op=LOAD Dec 13 14:16:42.746000 audit[3277]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3269 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:42.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633346535303862303364376564643862646130663139373231633261 Dec 13 14:16:42.848064 kubelet[2897]: E1213 14:16:42.842099 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.848064 kubelet[2897]: W1213 14:16:42.847752 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.848064 kubelet[2897]: E1213 14:16:42.847809 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.851624 kubelet[2897]: E1213 14:16:42.848541 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.851624 kubelet[2897]: W1213 14:16:42.848576 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.851624 kubelet[2897]: E1213 14:16:42.848610 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.851624 kubelet[2897]: E1213 14:16:42.851261 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.851624 kubelet[2897]: W1213 14:16:42.851293 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.851624 kubelet[2897]: E1213 14:16:42.851328 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.855970 kubelet[2897]: E1213 14:16:42.855474 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.855970 kubelet[2897]: W1213 14:16:42.855515 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.855970 kubelet[2897]: E1213 14:16:42.855552 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.856805 kubelet[2897]: E1213 14:16:42.856443 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.856805 kubelet[2897]: W1213 14:16:42.856478 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.856805 kubelet[2897]: E1213 14:16:42.856511 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.857455 env[1824]: time="2024-12-13T14:16:42.857361186Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:16:42.857983 env[1824]: time="2024-12-13T14:16:42.857893061Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:16:42.864515 env[1824]: time="2024-12-13T14:16:42.864417142Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/afcef961a8006e0fe0b7c5d2953993cfb77b1f1f0543a2ba7d37ca34efa10fe4 pid=3307 runtime=io.containerd.runc.v2 Dec 13 14:16:42.865583 kubelet[2897]: E1213 14:16:42.864946 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.865583 kubelet[2897]: W1213 14:16:42.864997 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.865583 kubelet[2897]: E1213 14:16:42.865045 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.866442 kubelet[2897]: E1213 14:16:42.866019 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.866442 kubelet[2897]: W1213 14:16:42.866055 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.866442 kubelet[2897]: E1213 14:16:42.866088 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.870484 kubelet[2897]: E1213 14:16:42.870424 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.870885 kubelet[2897]: W1213 14:16:42.870817 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.871069 kubelet[2897]: E1213 14:16:42.871040 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.871329 kubelet[2897]: I1213 14:16:42.871285 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c-kubelet-dir\") pod \"csi-node-driver-jcqpr\" (UID: \"7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c\") " pod="calico-system/csi-node-driver-jcqpr" Dec 13 14:16:42.874392 kubelet[2897]: E1213 14:16:42.874335 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.874663 kubelet[2897]: W1213 14:16:42.874625 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.874886 kubelet[2897]: E1213 14:16:42.874857 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.883697 kubelet[2897]: E1213 14:16:42.883516 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.883908 kubelet[2897]: W1213 14:16:42.883873 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.884076 kubelet[2897]: E1213 14:16:42.884048 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.884288 kubelet[2897]: I1213 14:16:42.884252 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c-varrun\") pod \"csi-node-driver-jcqpr\" (UID: \"7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c\") " pod="calico-system/csi-node-driver-jcqpr" Dec 13 14:16:42.884893 kubelet[2897]: E1213 14:16:42.884852 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.885150 kubelet[2897]: W1213 14:16:42.885080 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.885376 kubelet[2897]: E1213 14:16:42.885337 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.886034 kubelet[2897]: E1213 14:16:42.886006 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.886243 kubelet[2897]: W1213 14:16:42.886215 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.886399 kubelet[2897]: E1213 14:16:42.886374 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.887016 kubelet[2897]: E1213 14:16:42.886976 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.887277 kubelet[2897]: W1213 14:16:42.887235 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.887440 kubelet[2897]: E1213 14:16:42.887413 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.887928 kubelet[2897]: I1213 14:16:42.887898 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-849rs\" (UniqueName: \"kubernetes.io/projected/7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c-kube-api-access-849rs\") pod \"csi-node-driver-jcqpr\" (UID: \"7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c\") " pod="calico-system/csi-node-driver-jcqpr" Dec 13 14:16:42.891554 kubelet[2897]: E1213 14:16:42.891515 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.891809 kubelet[2897]: W1213 14:16:42.891755 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.892005 kubelet[2897]: E1213 14:16:42.891949 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.892833 kubelet[2897]: E1213 14:16:42.892784 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.893025 kubelet[2897]: W1213 14:16:42.892994 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.897629 kubelet[2897]: E1213 14:16:42.897565 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.899162 kubelet[2897]: E1213 14:16:42.899127 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.899467 kubelet[2897]: W1213 14:16:42.899402 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.899751 kubelet[2897]: E1213 14:16:42.899666 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.901193 kubelet[2897]: E1213 14:16:42.901073 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.901572 kubelet[2897]: W1213 14:16:42.901502 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.901843 kubelet[2897]: E1213 14:16:42.901780 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.902132 kubelet[2897]: I1213 14:16:42.902040 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c-registration-dir\") pod \"csi-node-driver-jcqpr\" (UID: \"7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c\") " pod="calico-system/csi-node-driver-jcqpr" Dec 13 14:16:42.905442 kubelet[2897]: E1213 14:16:42.905359 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.905711 kubelet[2897]: W1213 14:16:42.905676 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.905917 kubelet[2897]: E1213 14:16:42.905872 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.907550 kubelet[2897]: E1213 14:16:42.907474 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.907804 kubelet[2897]: W1213 14:16:42.907772 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.907983 kubelet[2897]: E1213 14:16:42.907956 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.908466 kubelet[2897]: I1213 14:16:42.908422 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c-socket-dir\") pod \"csi-node-driver-jcqpr\" (UID: \"7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c\") " pod="calico-system/csi-node-driver-jcqpr" Dec 13 14:16:42.911388 kubelet[2897]: E1213 14:16:42.911316 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.911629 kubelet[2897]: W1213 14:16:42.911595 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.911831 kubelet[2897]: E1213 14:16:42.911802 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.913211 kubelet[2897]: E1213 14:16:42.913170 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.913441 kubelet[2897]: W1213 14:16:42.913408 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.913624 kubelet[2897]: E1213 14:16:42.913579 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.915347 kubelet[2897]: E1213 14:16:42.915306 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:42.915561 kubelet[2897]: W1213 14:16:42.915530 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:42.915700 kubelet[2897]: E1213 14:16:42.915672 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:42.938130 systemd[1]: Started cri-containerd-afcef961a8006e0fe0b7c5d2953993cfb77b1f1f0543a2ba7d37ca34efa10fe4.scope. Dec 13 14:16:42.988000 audit[3363]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=3363 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:42.988000 audit[3363]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6652 a0=3 a1=ffffef93c600 a2=0 a3=1 items=0 ppid=3062 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:42.988000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:42.994000 audit[3363]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3363 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:42.994000 audit[3363]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffef93c600 a2=0 a3=1 items=0 ppid=3062 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:42.994000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:43.013391 kubelet[2897]: E1213 14:16:43.013310 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:43.013871 kubelet[2897]: W1213 14:16:43.013764 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:43.014273 kubelet[2897]: E1213 14:16:43.014207 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:43.015132 kubelet[2897]: E1213 14:16:43.015075 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:43.015553 kubelet[2897]: W1213 14:16:43.015480 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:43.015878 kubelet[2897]: E1213 14:16:43.015804 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:43.017355 kubelet[2897]: E1213 14:16:43.017292 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:43.017725 kubelet[2897]: W1213 14:16:43.017653 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:43.018027 kubelet[2897]: E1213 14:16:43.017952 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:43.019599 kubelet[2897]: E1213 14:16:43.019544 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:43.020010 kubelet[2897]: W1213 14:16:43.019922 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:43.020448 kubelet[2897]: E1213 14:16:43.020400 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:43.026184 kubelet[2897]: E1213 14:16:43.026143 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:43.029511 kubelet[2897]: W1213 14:16:43.029432 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:43.029831 kubelet[2897]: E1213 14:16:43.029775 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:43.031444 kubelet[2897]: E1213 14:16:43.031377 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:43.031835 kubelet[2897]: W1213 14:16:43.031707 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:43.032346 kubelet[2897]: E1213 14:16:43.032271 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:43.036421 kubelet[2897]: E1213 14:16:43.036348 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:43.036421 kubelet[2897]: W1213 14:16:43.036403 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:43.036834 kubelet[2897]: E1213 14:16:43.036456 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:43.041073 kubelet[2897]: E1213 14:16:43.037421 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:43.041073 kubelet[2897]: W1213 14:16:43.037476 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:43.041073 kubelet[2897]: E1213 14:16:43.037522 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:43.041073 kubelet[2897]: E1213 14:16:43.038165 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:43.041073 kubelet[2897]: W1213 14:16:43.038195 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:43.041073 kubelet[2897]: E1213 14:16:43.038279 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:43.041073 kubelet[2897]: E1213 14:16:43.038907 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:43.041073 kubelet[2897]: W1213 14:16:43.038946 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:43.041073 kubelet[2897]: E1213 14:16:43.038986 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:43.050246 kubelet[2897]: E1213 14:16:43.049886 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:43.050246 kubelet[2897]: W1213 14:16:43.049928 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:43.051162 kubelet[2897]: E1213 14:16:43.051059 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:43.053198 kubelet[2897]: E1213 14:16:43.051795 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:43.053198 kubelet[2897]: W1213 14:16:43.051845 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:43.053761 kubelet[2897]: E1213 14:16:43.053690 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:43.059175 kubelet[2897]: E1213 14:16:43.057689 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:43.059175 kubelet[2897]: W1213 14:16:43.057746 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:43.059519 kubelet[2897]: E1213 14:16:43.059464 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:43.061290 kubelet[2897]: E1213 14:16:43.060187 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:43.061290 kubelet[2897]: W1213 14:16:43.060244 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:43.061630 kubelet[2897]: E1213 14:16:43.061579 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:43.063882 kubelet[2897]: E1213 14:16:43.063732 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:43.063882 kubelet[2897]: W1213 14:16:43.063789 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:43.064422 kubelet[2897]: E1213 14:16:43.064367 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:43.065585 kubelet[2897]: E1213 14:16:43.064996 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:43.065585 kubelet[2897]: W1213 14:16:43.065037 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:43.066040 kubelet[2897]: E1213 14:16:43.065981 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:43.068187 kubelet[2897]: E1213 14:16:43.067358 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:43.068187 kubelet[2897]: W1213 14:16:43.067399 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:43.068664 kubelet[2897]: E1213 14:16:43.068608 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:43.071191 kubelet[2897]: E1213 14:16:43.070731 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:43.071191 kubelet[2897]: W1213 14:16:43.070773 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:43.071454 kubelet[2897]: E1213 14:16:43.071390 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:43.071454 kubelet[2897]: W1213 14:16:43.071419 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:43.073141 kubelet[2897]: E1213 14:16:43.071899 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:43.073141 kubelet[2897]: W1213 14:16:43.071938 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:43.073141 kubelet[2897]: E1213 14:16:43.072438 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:43.073141 kubelet[2897]: W1213 14:16:43.072463 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:43.073141 kubelet[2897]: E1213 14:16:43.072495 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:43.073141 kubelet[2897]: E1213 14:16:43.073075 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:43.073141 kubelet[2897]: W1213 14:16:43.073139 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:43.073687 kubelet[2897]: E1213 14:16:43.073176 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:43.073687 kubelet[2897]: E1213 14:16:43.073230 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:43.073854 kubelet[2897]: E1213 14:16:43.073803 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:43.073854 kubelet[2897]: W1213 14:16:43.073845 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:43.074016 kubelet[2897]: E1213 14:16:43.073880 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:43.074016 kubelet[2897]: E1213 14:16:43.073929 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:43.074016 kubelet[2897]: E1213 14:16:43.073962 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:43.081123 kubelet[2897]: E1213 14:16:43.080461 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:43.081123 kubelet[2897]: W1213 14:16:43.080504 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:43.081123 kubelet[2897]: E1213 14:16:43.080542 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:43.081502 kubelet[2897]: E1213 14:16:43.081177 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:43.081502 kubelet[2897]: W1213 14:16:43.081208 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:43.081502 kubelet[2897]: E1213 14:16:43.081240 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:43.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.089000 audit: BPF prog-id=128 op=LOAD Dec 13 14:16:43.090000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.090000 audit[3339]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3307 pid=3339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:43.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166636566393631613830303665306665306237633564323935333939 Dec 13 14:16:43.091000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.091000 audit[3339]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3307 pid=3339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:43.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166636566393631613830303665306665306237633564323935333939 Dec 13 14:16:43.091000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.091000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.091000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.091000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.091000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.091000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.091000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.091000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.091000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.091000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.091000 audit: BPF prog-id=129 op=LOAD Dec 13 14:16:43.091000 audit[3339]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3307 pid=3339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:43.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166636566393631613830303665306665306237633564323935333939 Dec 13 14:16:43.094000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.094000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.094000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.094000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.094000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.094000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.094000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.094000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.094000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.094000 audit: BPF prog-id=130 op=LOAD Dec 13 14:16:43.094000 audit[3339]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3307 pid=3339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:43.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166636566393631613830303665306665306237633564323935333939 Dec 13 14:16:43.095000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:16:43.095000 audit: BPF prog-id=129 op=UNLOAD Dec 13 14:16:43.095000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.095000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.095000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.095000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.095000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.095000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.095000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.095000 audit[3339]: AVC avc: denied { perfmon } for pid=3339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.095000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.095000 audit[3339]: AVC avc: denied { bpf } for pid=3339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:43.095000 audit: BPF prog-id=131 op=LOAD Dec 13 14:16:43.095000 audit[3339]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3307 pid=3339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:43.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166636566393631613830303665306665306237633564323935333939 Dec 13 14:16:43.103499 env[1824]: time="2024-12-13T14:16:43.103431512Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-57b467f8fb-gkq82,Uid:792ffb46-6406-427d-89e0-8fdac7633da5,Namespace:calico-system,Attempt:0,} returns sandbox id \"f34e508b03d7edd8bda0f19721c2a4a01430154fd73bb1c2130f2714b71fa82b\"" Dec 13 14:16:43.110511 env[1824]: time="2024-12-13T14:16:43.110447269Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 14:16:43.116358 kubelet[2897]: E1213 14:16:43.116310 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:43.116581 kubelet[2897]: W1213 14:16:43.116549 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:43.116848 kubelet[2897]: E1213 14:16:43.116817 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:43.145354 env[1824]: time="2024-12-13T14:16:43.145169543Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rnv2r,Uid:82f6882e-edde-42fc-9640-19b56534d09c,Namespace:calico-system,Attempt:0,} returns sandbox id \"afcef961a8006e0fe0b7c5d2953993cfb77b1f1f0543a2ba7d37ca34efa10fe4\"" Dec 13 14:16:43.243337 systemd[1]: run-containerd-runc-k8s.io-f34e508b03d7edd8bda0f19721c2a4a01430154fd73bb1c2130f2714b71fa82b-runc.LUEzCo.mount: Deactivated successfully. Dec 13 14:16:44.326889 kubelet[2897]: E1213 14:16:44.325914 2897 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jcqpr" podUID="7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c" Dec 13 14:16:44.638878 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount94452947.mount: Deactivated successfully. Dec 13 14:16:45.782932 env[1824]: time="2024-12-13T14:16:45.782828275Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:45.788186 env[1824]: time="2024-12-13T14:16:45.788101118Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1d1fc316829ae1650b0b1629b54232520f297e7c3b1444eecd290ae088902a28,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:45.792567 env[1824]: time="2024-12-13T14:16:45.792471117Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:45.797517 env[1824]: time="2024-12-13T14:16:45.797423752Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:45.799668 env[1824]: time="2024-12-13T14:16:45.799550102Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:1d1fc316829ae1650b0b1629b54232520f297e7c3b1444eecd290ae088902a28\"" Dec 13 14:16:45.817503 env[1824]: time="2024-12-13T14:16:45.815365665Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:16:45.848176 env[1824]: time="2024-12-13T14:16:45.847258644Z" level=info msg="CreateContainer within sandbox \"f34e508b03d7edd8bda0f19721c2a4a01430154fd73bb1c2130f2714b71fa82b\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 14:16:45.891981 env[1824]: time="2024-12-13T14:16:45.888262457Z" level=info msg="CreateContainer within sandbox \"f34e508b03d7edd8bda0f19721c2a4a01430154fd73bb1c2130f2714b71fa82b\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"942ef0b764a567f26b69257b6529f09d71cf62e75dd1d3b59bb6642690a450c3\"" Dec 13 14:16:45.891981 env[1824]: time="2024-12-13T14:16:45.889567876Z" level=info msg="StartContainer for \"942ef0b764a567f26b69257b6529f09d71cf62e75dd1d3b59bb6642690a450c3\"" Dec 13 14:16:45.890599 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2700323385.mount: Deactivated successfully. Dec 13 14:16:45.958929 systemd[1]: Started cri-containerd-942ef0b764a567f26b69257b6529f09d71cf62e75dd1d3b59bb6642690a450c3.scope. Dec 13 14:16:46.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.011000 audit: BPF prog-id=132 op=LOAD Dec 13 14:16:46.013000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.013000 audit[3421]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=3269 pid=3421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:46.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934326566306237363461353637663236623639323537623635323966 Dec 13 14:16:46.014000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.014000 audit[3421]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=3269 pid=3421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:46.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934326566306237363461353637663236623639323537623635323966 Dec 13 14:16:46.014000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.014000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.014000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.014000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.014000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.014000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.014000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.014000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.014000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.014000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.014000 audit: BPF prog-id=133 op=LOAD Dec 13 14:16:46.014000 audit[3421]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=3269 pid=3421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:46.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934326566306237363461353637663236623639323537623635323966 Dec 13 14:16:46.014000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.014000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.014000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.014000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.014000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.014000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.014000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.014000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.014000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.014000 audit: BPF prog-id=134 op=LOAD Dec 13 14:16:46.014000 audit[3421]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=3269 pid=3421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:46.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934326566306237363461353637663236623639323537623635323966 Dec 13 14:16:46.014000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:16:46.015000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:16:46.015000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.015000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.015000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.015000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.015000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.015000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.015000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.015000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.015000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.015000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:46.015000 audit: BPF prog-id=135 op=LOAD Dec 13 14:16:46.015000 audit[3421]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=3269 pid=3421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:46.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934326566306237363461353637663236623639323537623635323966 Dec 13 14:16:46.091056 env[1824]: time="2024-12-13T14:16:46.090867152Z" level=info msg="StartContainer for \"942ef0b764a567f26b69257b6529f09d71cf62e75dd1d3b59bb6642690a450c3\" returns successfully" Dec 13 14:16:46.326964 kubelet[2897]: E1213 14:16:46.326281 2897 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jcqpr" podUID="7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c" Dec 13 14:16:46.593175 kubelet[2897]: I1213 14:16:46.593038 2897 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-57b467f8fb-gkq82" podStartSLOduration=1.899905372 podStartE2EDuration="4.592990497s" podCreationTimestamp="2024-12-13 14:16:42 +0000 UTC" firstStartedPulling="2024-12-13 14:16:43.10961519 +0000 UTC m=+24.089218541" lastFinishedPulling="2024-12-13 14:16:45.802700327 +0000 UTC m=+26.782303666" observedRunningTime="2024-12-13 14:16:46.570292257 +0000 UTC m=+27.549895644" watchObservedRunningTime="2024-12-13 14:16:46.592990497 +0000 UTC m=+27.572593872" Dec 13 14:16:46.595312 kubelet[2897]: E1213 14:16:46.595253 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.595555 kubelet[2897]: W1213 14:16:46.595517 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.595755 kubelet[2897]: E1213 14:16:46.595724 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.597350 kubelet[2897]: E1213 14:16:46.597290 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.597350 kubelet[2897]: W1213 14:16:46.597334 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.597562 kubelet[2897]: E1213 14:16:46.597388 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.597922 kubelet[2897]: E1213 14:16:46.597871 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.597922 kubelet[2897]: W1213 14:16:46.597907 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.598091 kubelet[2897]: E1213 14:16:46.597937 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.598524 kubelet[2897]: E1213 14:16:46.598478 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.598524 kubelet[2897]: W1213 14:16:46.598514 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.598692 kubelet[2897]: E1213 14:16:46.598545 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.598962 kubelet[2897]: E1213 14:16:46.598916 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.598962 kubelet[2897]: W1213 14:16:46.598950 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.599221 kubelet[2897]: E1213 14:16:46.598979 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.599415 kubelet[2897]: E1213 14:16:46.599370 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.599415 kubelet[2897]: W1213 14:16:46.599405 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.599563 kubelet[2897]: E1213 14:16:46.599434 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.599805 kubelet[2897]: E1213 14:16:46.599763 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.599805 kubelet[2897]: W1213 14:16:46.599798 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.599950 kubelet[2897]: E1213 14:16:46.599825 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.600231 kubelet[2897]: E1213 14:16:46.600191 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.600231 kubelet[2897]: W1213 14:16:46.600221 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.600410 kubelet[2897]: E1213 14:16:46.600248 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.600706 kubelet[2897]: E1213 14:16:46.600657 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.600706 kubelet[2897]: W1213 14:16:46.600692 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.600879 kubelet[2897]: E1213 14:16:46.600720 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.601196 kubelet[2897]: E1213 14:16:46.601144 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.601196 kubelet[2897]: W1213 14:16:46.601180 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.601350 kubelet[2897]: E1213 14:16:46.601213 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.601604 kubelet[2897]: E1213 14:16:46.601557 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.601604 kubelet[2897]: W1213 14:16:46.601591 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.601794 kubelet[2897]: E1213 14:16:46.601617 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.602156 kubelet[2897]: E1213 14:16:46.602038 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.602156 kubelet[2897]: W1213 14:16:46.602073 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.602156 kubelet[2897]: E1213 14:16:46.602102 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.603336 kubelet[2897]: E1213 14:16:46.603283 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.603336 kubelet[2897]: W1213 14:16:46.603324 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.603608 kubelet[2897]: E1213 14:16:46.603360 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.603774 kubelet[2897]: E1213 14:16:46.603753 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.603842 kubelet[2897]: W1213 14:16:46.603775 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.603842 kubelet[2897]: E1213 14:16:46.603799 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.604597 kubelet[2897]: E1213 14:16:46.604543 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.604597 kubelet[2897]: W1213 14:16:46.604583 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.604856 kubelet[2897]: E1213 14:16:46.604616 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.631000 audit[3467]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3467 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:46.631000 audit[3467]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=fffffeddeb80 a2=0 a3=1 items=0 ppid=3062 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:46.631000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:46.637000 audit[3467]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3467 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:46.637000 audit[3467]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=fffffeddeb80 a2=0 a3=1 items=0 ppid=3062 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:46.637000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:46.667576 kubelet[2897]: E1213 14:16:46.667492 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.667576 kubelet[2897]: W1213 14:16:46.667555 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.667922 kubelet[2897]: E1213 14:16:46.667606 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.668360 kubelet[2897]: E1213 14:16:46.668308 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.668360 kubelet[2897]: W1213 14:16:46.668347 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.668582 kubelet[2897]: E1213 14:16:46.668389 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.668971 kubelet[2897]: E1213 14:16:46.668919 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.668971 kubelet[2897]: W1213 14:16:46.668959 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.669265 kubelet[2897]: E1213 14:16:46.669013 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.669746 kubelet[2897]: E1213 14:16:46.669707 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.669944 kubelet[2897]: W1213 14:16:46.669744 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.670051 kubelet[2897]: E1213 14:16:46.670023 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.670532 kubelet[2897]: E1213 14:16:46.670494 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.670532 kubelet[2897]: W1213 14:16:46.670527 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.670752 kubelet[2897]: E1213 14:16:46.670715 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.671151 kubelet[2897]: E1213 14:16:46.671068 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.671355 kubelet[2897]: W1213 14:16:46.671098 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.671700 kubelet[2897]: E1213 14:16:46.671455 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.672050 kubelet[2897]: E1213 14:16:46.672010 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.672220 kubelet[2897]: W1213 14:16:46.672048 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.672402 kubelet[2897]: E1213 14:16:46.672348 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.672563 kubelet[2897]: E1213 14:16:46.672533 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.672642 kubelet[2897]: W1213 14:16:46.672565 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.672931 kubelet[2897]: E1213 14:16:46.672773 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.673504 kubelet[2897]: E1213 14:16:46.673431 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.673504 kubelet[2897]: W1213 14:16:46.673486 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.674000 kubelet[2897]: E1213 14:16:46.673786 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.674309 kubelet[2897]: E1213 14:16:46.674276 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.674400 kubelet[2897]: W1213 14:16:46.674319 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.674646 kubelet[2897]: E1213 14:16:46.674522 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.674889 kubelet[2897]: E1213 14:16:46.674854 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.675020 kubelet[2897]: W1213 14:16:46.674898 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.675536 kubelet[2897]: E1213 14:16:46.675235 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.675884 kubelet[2897]: E1213 14:16:46.675849 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.676080 kubelet[2897]: W1213 14:16:46.675896 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.676325 kubelet[2897]: E1213 14:16:46.676101 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.676817 kubelet[2897]: E1213 14:16:46.676756 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.676817 kubelet[2897]: W1213 14:16:46.676812 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.677368 kubelet[2897]: E1213 14:16:46.677088 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.678270 kubelet[2897]: E1213 14:16:46.678229 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.678270 kubelet[2897]: W1213 14:16:46.678264 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.678846 kubelet[2897]: E1213 14:16:46.678607 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.679804 kubelet[2897]: E1213 14:16:46.679721 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.679804 kubelet[2897]: W1213 14:16:46.679802 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.680053 kubelet[2897]: E1213 14:16:46.680013 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.680814 kubelet[2897]: E1213 14:16:46.680742 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.681010 kubelet[2897]: W1213 14:16:46.680809 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.681416 kubelet[2897]: E1213 14:16:46.681195 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.681779 kubelet[2897]: E1213 14:16:46.681746 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.681888 kubelet[2897]: W1213 14:16:46.681779 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.682015 kubelet[2897]: E1213 14:16:46.681981 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:46.682391 kubelet[2897]: E1213 14:16:46.682358 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:46.682518 kubelet[2897]: W1213 14:16:46.682388 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:46.682518 kubelet[2897]: E1213 14:16:46.682422 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.593468 env[1824]: time="2024-12-13T14:16:47.593352407Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:47.596039 env[1824]: time="2024-12-13T14:16:47.595957040Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:47.599637 env[1824]: time="2024-12-13T14:16:47.599560805Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:47.603518 env[1824]: time="2024-12-13T14:16:47.603439885Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:47.604801 env[1824]: time="2024-12-13T14:16:47.604726403Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348\"" Dec 13 14:16:47.609334 env[1824]: time="2024-12-13T14:16:47.609272011Z" level=info msg="CreateContainer within sandbox \"afcef961a8006e0fe0b7c5d2953993cfb77b1f1f0543a2ba7d37ca34efa10fe4\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:16:47.613518 kubelet[2897]: E1213 14:16:47.613465 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.614043 kubelet[2897]: W1213 14:16:47.613558 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.614043 kubelet[2897]: E1213 14:16:47.613594 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.614217 kubelet[2897]: E1213 14:16:47.614134 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.614217 kubelet[2897]: W1213 14:16:47.614156 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.614217 kubelet[2897]: E1213 14:16:47.614183 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.614766 kubelet[2897]: E1213 14:16:47.614726 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.614766 kubelet[2897]: W1213 14:16:47.614763 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.614918 kubelet[2897]: E1213 14:16:47.614790 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.615188 kubelet[2897]: E1213 14:16:47.615155 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.615188 kubelet[2897]: W1213 14:16:47.615181 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.615339 kubelet[2897]: E1213 14:16:47.615205 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.615978 kubelet[2897]: E1213 14:16:47.615929 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.615978 kubelet[2897]: W1213 14:16:47.615966 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.616188 kubelet[2897]: E1213 14:16:47.615995 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.616429 kubelet[2897]: E1213 14:16:47.616391 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.616429 kubelet[2897]: W1213 14:16:47.616420 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.616568 kubelet[2897]: E1213 14:16:47.616447 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.616902 kubelet[2897]: E1213 14:16:47.616857 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.616902 kubelet[2897]: W1213 14:16:47.616899 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.617047 kubelet[2897]: E1213 14:16:47.616925 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.617434 kubelet[2897]: E1213 14:16:47.617401 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.617531 kubelet[2897]: W1213 14:16:47.617432 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.617531 kubelet[2897]: E1213 14:16:47.617459 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.617937 kubelet[2897]: E1213 14:16:47.617910 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.617937 kubelet[2897]: W1213 14:16:47.617937 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.618093 kubelet[2897]: E1213 14:16:47.617974 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.618508 kubelet[2897]: E1213 14:16:47.618463 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.618508 kubelet[2897]: W1213 14:16:47.618496 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.618686 kubelet[2897]: E1213 14:16:47.618525 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.619005 kubelet[2897]: E1213 14:16:47.618905 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.619005 kubelet[2897]: W1213 14:16:47.618997 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.619187 kubelet[2897]: E1213 14:16:47.619024 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.619496 kubelet[2897]: E1213 14:16:47.619446 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.619496 kubelet[2897]: W1213 14:16:47.619487 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.619636 kubelet[2897]: E1213 14:16:47.619523 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.619928 kubelet[2897]: E1213 14:16:47.619898 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.620006 kubelet[2897]: W1213 14:16:47.619925 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.620006 kubelet[2897]: E1213 14:16:47.619950 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.620458 kubelet[2897]: E1213 14:16:47.620427 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.620458 kubelet[2897]: W1213 14:16:47.620456 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.620678 kubelet[2897]: E1213 14:16:47.620481 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.620853 kubelet[2897]: E1213 14:16:47.620817 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.620930 kubelet[2897]: W1213 14:16:47.620851 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.620930 kubelet[2897]: E1213 14:16:47.620875 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.634220 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1585937770.mount: Deactivated successfully. Dec 13 14:16:47.644293 env[1824]: time="2024-12-13T14:16:47.644210540Z" level=info msg="CreateContainer within sandbox \"afcef961a8006e0fe0b7c5d2953993cfb77b1f1f0543a2ba7d37ca34efa10fe4\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"f3c850055204e8f872160a6bd4ae53323392dad99f1ccccdb6eb1e415077514d\"" Dec 13 14:16:47.646865 env[1824]: time="2024-12-13T14:16:47.646534409Z" level=info msg="StartContainer for \"f3c850055204e8f872160a6bd4ae53323392dad99f1ccccdb6eb1e415077514d\"" Dec 13 14:16:47.685685 kubelet[2897]: E1213 14:16:47.685625 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.685685 kubelet[2897]: W1213 14:16:47.685669 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.685958 kubelet[2897]: E1213 14:16:47.685707 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.687976 kubelet[2897]: E1213 14:16:47.687921 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.687976 kubelet[2897]: W1213 14:16:47.687963 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.688302 kubelet[2897]: E1213 14:16:47.688013 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.688822 kubelet[2897]: E1213 14:16:47.688770 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.688822 kubelet[2897]: W1213 14:16:47.688810 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.689248 kubelet[2897]: E1213 14:16:47.689092 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.692327 kubelet[2897]: E1213 14:16:47.690746 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.692327 kubelet[2897]: W1213 14:16:47.690786 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.692327 kubelet[2897]: E1213 14:16:47.690997 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.705155 kubelet[2897]: E1213 14:16:47.705092 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.705627 kubelet[2897]: W1213 14:16:47.705565 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.706480 kubelet[2897]: E1213 14:16:47.706441 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.707575 kubelet[2897]: E1213 14:16:47.707507 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.707954 kubelet[2897]: W1213 14:16:47.707862 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.708409 kubelet[2897]: E1213 14:16:47.708378 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.711546 systemd[1]: Started cri-containerd-f3c850055204e8f872160a6bd4ae53323392dad99f1ccccdb6eb1e415077514d.scope. Dec 13 14:16:47.715100 kubelet[2897]: E1213 14:16:47.715054 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.715832 kubelet[2897]: W1213 14:16:47.715771 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.716400 kubelet[2897]: E1213 14:16:47.716359 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.717438 kubelet[2897]: E1213 14:16:47.717403 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.718316 kubelet[2897]: W1213 14:16:47.718235 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.718877 kubelet[2897]: E1213 14:16:47.718777 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.718877 kubelet[2897]: W1213 14:16:47.718841 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.720908 kubelet[2897]: E1213 14:16:47.720826 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.724007 kubelet[2897]: E1213 14:16:47.723965 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.726011 kubelet[2897]: E1213 14:16:47.725964 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.726011 kubelet[2897]: W1213 14:16:47.726004 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.726351 kubelet[2897]: E1213 14:16:47.726054 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.726662 kubelet[2897]: E1213 14:16:47.726609 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.726662 kubelet[2897]: W1213 14:16:47.726659 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.727066 kubelet[2897]: E1213 14:16:47.726968 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.727745 kubelet[2897]: E1213 14:16:47.727211 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.727979 kubelet[2897]: W1213 14:16:47.727942 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.728464 kubelet[2897]: E1213 14:16:47.728391 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.728900 kubelet[2897]: E1213 14:16:47.728854 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.729292 kubelet[2897]: W1213 14:16:47.729180 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.729752 kubelet[2897]: E1213 14:16:47.729713 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.730379 kubelet[2897]: E1213 14:16:47.730186 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.730379 kubelet[2897]: W1213 14:16:47.730372 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.730905 kubelet[2897]: E1213 14:16:47.730783 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.732347 kubelet[2897]: E1213 14:16:47.732302 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.732347 kubelet[2897]: W1213 14:16:47.732341 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.732697 kubelet[2897]: E1213 14:16:47.732390 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.733931 kubelet[2897]: E1213 14:16:47.733887 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.733931 kubelet[2897]: W1213 14:16:47.733925 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.734412 kubelet[2897]: E1213 14:16:47.734358 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.734412 kubelet[2897]: W1213 14:16:47.734379 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.734819 kubelet[2897]: E1213 14:16:47.734414 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.735367 kubelet[2897]: E1213 14:16:47.735219 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.735666 kubelet[2897]: E1213 14:16:47.735627 2897 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.735666 kubelet[2897]: W1213 14:16:47.735662 2897 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.735882 kubelet[2897]: E1213 14:16:47.735709 2897 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.763164 kernel: kauditd_printk_skb: 173 callbacks suppressed Dec 13 14:16:47.763310 kernel: audit: type=1400 audit(1734099407.760:1005): avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.760000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.760000 audit[3509]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3307 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:47.781153 kernel: audit: type=1300 audit(1734099407.760:1005): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3307 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:47.781328 kernel: audit: type=1327 audit(1734099407.760:1005): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633633835303035353230346538663837323136306136626434616535 Dec 13 14:16:47.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633633835303035353230346538663837323136306136626434616535 Dec 13 14:16:47.762000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.799025 kernel: audit: type=1400 audit(1734099407.762:1006): avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.799289 kernel: audit: type=1400 audit(1734099407.762:1006): avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.762000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.762000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.815949 systemd[1]: run-containerd-runc-k8s.io-f3c850055204e8f872160a6bd4ae53323392dad99f1ccccdb6eb1e415077514d-runc.QuJDHS.mount: Deactivated successfully. Dec 13 14:16:47.762000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.830830 kernel: audit: type=1400 audit(1734099407.762:1006): avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.830989 kernel: audit: type=1400 audit(1734099407.762:1006): avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.762000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.838929 kernel: audit: type=1400 audit(1734099407.762:1006): avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.762000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.852083 kernel: audit: type=1400 audit(1734099407.762:1006): avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.857481 env[1824]: time="2024-12-13T14:16:47.857376645Z" level=info msg="StartContainer for \"f3c850055204e8f872160a6bd4ae53323392dad99f1ccccdb6eb1e415077514d\" returns successfully" Dec 13 14:16:47.762000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.877328 kernel: audit: type=1400 audit(1734099407.762:1006): avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.762000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.762000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.762000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.762000 audit: BPF prog-id=136 op=LOAD Dec 13 14:16:47.762000 audit[3509]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3307 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:47.762000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633633835303035353230346538663837323136306136626434616535 Dec 13 14:16:47.769000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.769000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.769000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.769000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.769000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.769000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.769000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.769000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.769000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.769000 audit: BPF prog-id=137 op=LOAD Dec 13 14:16:47.769000 audit[3509]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3307 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:47.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633633835303035353230346538663837323136306136626434616535 Dec 13 14:16:47.780000 audit: BPF prog-id=137 op=UNLOAD Dec 13 14:16:47.780000 audit: BPF prog-id=136 op=UNLOAD Dec 13 14:16:47.780000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.780000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.780000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.780000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.780000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.780000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.780000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.780000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.780000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.780000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.780000 audit: BPF prog-id=138 op=LOAD Dec 13 14:16:47.780000 audit[3509]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3307 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:47.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633633835303035353230346538663837323136306136626434616535 Dec 13 14:16:47.892784 systemd[1]: cri-containerd-f3c850055204e8f872160a6bd4ae53323392dad99f1ccccdb6eb1e415077514d.scope: Deactivated successfully. Dec 13 14:16:47.895000 audit: BPF prog-id=138 op=UNLOAD Dec 13 14:16:47.954312 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f3c850055204e8f872160a6bd4ae53323392dad99f1ccccdb6eb1e415077514d-rootfs.mount: Deactivated successfully. Dec 13 14:16:48.211502 env[1824]: time="2024-12-13T14:16:48.211311864Z" level=info msg="shim disconnected" id=f3c850055204e8f872160a6bd4ae53323392dad99f1ccccdb6eb1e415077514d Dec 13 14:16:48.211502 env[1824]: time="2024-12-13T14:16:48.211390056Z" level=warning msg="cleaning up after shim disconnected" id=f3c850055204e8f872160a6bd4ae53323392dad99f1ccccdb6eb1e415077514d namespace=k8s.io Dec 13 14:16:48.211502 env[1824]: time="2024-12-13T14:16:48.211413504Z" level=info msg="cleaning up dead shim" Dec 13 14:16:48.231721 env[1824]: time="2024-12-13T14:16:48.231616384Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:16:48Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3568 runtime=io.containerd.runc.v2\n" Dec 13 14:16:48.325792 kubelet[2897]: E1213 14:16:48.325716 2897 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jcqpr" podUID="7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c" Dec 13 14:16:48.556427 env[1824]: time="2024-12-13T14:16:48.556349346Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:16:50.325790 kubelet[2897]: E1213 14:16:50.325721 2897 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jcqpr" podUID="7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c" Dec 13 14:16:52.326181 kubelet[2897]: E1213 14:16:52.325856 2897 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jcqpr" podUID="7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c" Dec 13 14:16:54.084201 env[1824]: time="2024-12-13T14:16:54.084079855Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:54.088175 env[1824]: time="2024-12-13T14:16:54.088069240Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:54.091039 env[1824]: time="2024-12-13T14:16:54.090985345Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:54.094287 env[1824]: time="2024-12-13T14:16:54.094200814Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:54.095792 env[1824]: time="2024-12-13T14:16:54.095713305Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f\"" Dec 13 14:16:54.106070 env[1824]: time="2024-12-13T14:16:54.105919103Z" level=info msg="CreateContainer within sandbox \"afcef961a8006e0fe0b7c5d2953993cfb77b1f1f0543a2ba7d37ca34efa10fe4\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:16:54.129065 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3842688721.mount: Deactivated successfully. Dec 13 14:16:54.142254 env[1824]: time="2024-12-13T14:16:54.142179626Z" level=info msg="CreateContainer within sandbox \"afcef961a8006e0fe0b7c5d2953993cfb77b1f1f0543a2ba7d37ca34efa10fe4\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"70d2d0297a606e3498dcc243aecf0eddf3a6e635bc4082af5b5cdc67d71c89bf\"" Dec 13 14:16:54.143505 env[1824]: time="2024-12-13T14:16:54.143447737Z" level=info msg="StartContainer for \"70d2d0297a606e3498dcc243aecf0eddf3a6e635bc4082af5b5cdc67d71c89bf\"" Dec 13 14:16:54.205060 systemd[1]: Started cri-containerd-70d2d0297a606e3498dcc243aecf0eddf3a6e635bc4082af5b5cdc67d71c89bf.scope. Dec 13 14:16:54.265000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.268415 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:16:54.268592 kernel: audit: type=1400 audit(1734099414.265:1012): avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.265000 audit[3594]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3307 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:54.286651 kernel: audit: type=1300 audit(1734099414.265:1012): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3307 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:54.286865 kernel: audit: type=1327 audit(1734099414.265:1012): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730643264303239376136303665333439386463633234336165636630 Dec 13 14:16:54.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730643264303239376136303665333439386463633234336165636630 Dec 13 14:16:54.297284 kernel: audit: type=1400 audit(1734099414.265:1013): avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.265000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.265000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.311915 kernel: audit: type=1400 audit(1734099414.265:1013): avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.265000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.319433 kernel: audit: type=1400 audit(1734099414.265:1013): avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.265000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.325481 kubelet[2897]: E1213 14:16:54.325397 2897 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jcqpr" podUID="7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c" Dec 13 14:16:54.328057 kernel: audit: type=1400 audit(1734099414.265:1013): avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.265000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.341319 kernel: audit: type=1400 audit(1734099414.265:1013): avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.265000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.354177 kernel: audit: type=1400 audit(1734099414.265:1013): avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.265000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.366219 kernel: audit: type=1400 audit(1734099414.265:1013): avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.265000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.265000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.265000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.265000 audit: BPF prog-id=139 op=LOAD Dec 13 14:16:54.265000 audit[3594]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3307 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:54.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730643264303239376136303665333439386463633234336165636630 Dec 13 14:16:54.268000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.268000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.268000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.268000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.268000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.268000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.268000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.268000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.268000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.268000 audit: BPF prog-id=140 op=LOAD Dec 13 14:16:54.268000 audit[3594]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3307 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:54.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730643264303239376136303665333439386463633234336165636630 Dec 13 14:16:54.275000 audit: BPF prog-id=140 op=UNLOAD Dec 13 14:16:54.275000 audit: BPF prog-id=139 op=UNLOAD Dec 13 14:16:54.275000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.275000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.275000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.275000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.275000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.275000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.275000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.275000 audit[3594]: AVC avc: denied { perfmon } for pid=3594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.275000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.275000 audit[3594]: AVC avc: denied { bpf } for pid=3594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:54.275000 audit: BPF prog-id=141 op=LOAD Dec 13 14:16:54.275000 audit[3594]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3307 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:54.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730643264303239376136303665333439386463633234336165636630 Dec 13 14:16:54.377033 env[1824]: time="2024-12-13T14:16:54.376965556Z" level=info msg="StartContainer for \"70d2d0297a606e3498dcc243aecf0eddf3a6e635bc4082af5b5cdc67d71c89bf\" returns successfully" Dec 13 14:16:55.519875 env[1824]: time="2024-12-13T14:16:55.519779428Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:16:55.526282 systemd[1]: cri-containerd-70d2d0297a606e3498dcc243aecf0eddf3a6e635bc4082af5b5cdc67d71c89bf.scope: Deactivated successfully. Dec 13 14:16:55.526808 systemd[1]: cri-containerd-70d2d0297a606e3498dcc243aecf0eddf3a6e635bc4082af5b5cdc67d71c89bf.scope: Consumed 1.160s CPU time. Dec 13 14:16:55.530000 audit: BPF prog-id=141 op=UNLOAD Dec 13 14:16:55.572387 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-70d2d0297a606e3498dcc243aecf0eddf3a6e635bc4082af5b5cdc67d71c89bf-rootfs.mount: Deactivated successfully. Dec 13 14:16:55.607816 kubelet[2897]: I1213 14:16:55.607771 2897 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:16:55.668423 kubelet[2897]: I1213 14:16:55.668351 2897 topology_manager.go:215] "Topology Admit Handler" podUID="beeed929-9ff9-469f-a97d-206e30099032" podNamespace="kube-system" podName="coredns-7db6d8ff4d-xg6zq" Dec 13 14:16:55.675846 kubelet[2897]: W1213 14:16:55.675770 2897 reflector.go:547] object-"kube-system"/"coredns": failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ip-172-31-24-217" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ip-172-31-24-217' and this object Dec 13 14:16:55.676451 kubelet[2897]: E1213 14:16:55.676404 2897 reflector.go:150] object-"kube-system"/"coredns": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ip-172-31-24-217" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ip-172-31-24-217' and this object Dec 13 14:16:55.687356 kubelet[2897]: I1213 14:16:55.687307 2897 topology_manager.go:215] "Topology Admit Handler" podUID="3fe07beb-f75f-4d6e-8ba9-f2ae93fab6db" podNamespace="calico-system" podName="calico-kube-controllers-56dc846f8d-88fpd" Dec 13 14:16:55.697690 systemd[1]: Created slice kubepods-burstable-podbeeed929_9ff9_469f_a97d_206e30099032.slice. Dec 13 14:16:55.711069 kubelet[2897]: I1213 14:16:55.709854 2897 topology_manager.go:215] "Topology Admit Handler" podUID="eaf54e69-06a6-44c4-9afc-ea6802f54674" podNamespace="kube-system" podName="coredns-7db6d8ff4d-7rpbw" Dec 13 14:16:55.721706 kubelet[2897]: I1213 14:16:55.721608 2897 topology_manager.go:215] "Topology Admit Handler" podUID="f5a3f4a9-fdfd-48cb-a792-bf6570e63fbf" podNamespace="calico-apiserver" podName="calico-apiserver-5fbcf8bc7f-mnfv8" Dec 13 14:16:55.729625 systemd[1]: Created slice kubepods-besteffort-pod3fe07beb_f75f_4d6e_8ba9_f2ae93fab6db.slice. Dec 13 14:16:55.737914 kubelet[2897]: I1213 14:16:55.737844 2897 topology_manager.go:215] "Topology Admit Handler" podUID="c77b0a0c-a45a-4fdb-9438-06ec79198e34" podNamespace="calico-apiserver" podName="calico-apiserver-5fbcf8bc7f-l2sq4" Dec 13 14:16:55.760202 kubelet[2897]: I1213 14:16:55.758462 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/beeed929-9ff9-469f-a97d-206e30099032-config-volume\") pod \"coredns-7db6d8ff4d-xg6zq\" (UID: \"beeed929-9ff9-469f-a97d-206e30099032\") " pod="kube-system/coredns-7db6d8ff4d-xg6zq" Dec 13 14:16:55.760202 kubelet[2897]: I1213 14:16:55.758562 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v9wwk\" (UniqueName: \"kubernetes.io/projected/3fe07beb-f75f-4d6e-8ba9-f2ae93fab6db-kube-api-access-v9wwk\") pod \"calico-kube-controllers-56dc846f8d-88fpd\" (UID: \"3fe07beb-f75f-4d6e-8ba9-f2ae93fab6db\") " pod="calico-system/calico-kube-controllers-56dc846f8d-88fpd" Dec 13 14:16:55.760202 kubelet[2897]: I1213 14:16:55.758649 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3fe07beb-f75f-4d6e-8ba9-f2ae93fab6db-tigera-ca-bundle\") pod \"calico-kube-controllers-56dc846f8d-88fpd\" (UID: \"3fe07beb-f75f-4d6e-8ba9-f2ae93fab6db\") " pod="calico-system/calico-kube-controllers-56dc846f8d-88fpd" Dec 13 14:16:55.760202 kubelet[2897]: I1213 14:16:55.758708 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lpbhg\" (UniqueName: \"kubernetes.io/projected/beeed929-9ff9-469f-a97d-206e30099032-kube-api-access-lpbhg\") pod \"coredns-7db6d8ff4d-xg6zq\" (UID: \"beeed929-9ff9-469f-a97d-206e30099032\") " pod="kube-system/coredns-7db6d8ff4d-xg6zq" Dec 13 14:16:55.763429 systemd[1]: Created slice kubepods-besteffort-podf5a3f4a9_fdfd_48cb_a792_bf6570e63fbf.slice. Dec 13 14:16:55.774081 systemd[1]: Created slice kubepods-burstable-podeaf54e69_06a6_44c4_9afc_ea6802f54674.slice. Dec 13 14:16:55.789413 systemd[1]: Created slice kubepods-besteffort-podc77b0a0c_a45a_4fdb_9438_06ec79198e34.slice. Dec 13 14:16:55.859286 kubelet[2897]: I1213 14:16:55.859192 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/c77b0a0c-a45a-4fdb-9438-06ec79198e34-calico-apiserver-certs\") pod \"calico-apiserver-5fbcf8bc7f-l2sq4\" (UID: \"c77b0a0c-a45a-4fdb-9438-06ec79198e34\") " pod="calico-apiserver/calico-apiserver-5fbcf8bc7f-l2sq4" Dec 13 14:16:55.859507 kubelet[2897]: I1213 14:16:55.859323 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vjtdd\" (UniqueName: \"kubernetes.io/projected/eaf54e69-06a6-44c4-9afc-ea6802f54674-kube-api-access-vjtdd\") pod \"coredns-7db6d8ff4d-7rpbw\" (UID: \"eaf54e69-06a6-44c4-9afc-ea6802f54674\") " pod="kube-system/coredns-7db6d8ff4d-7rpbw" Dec 13 14:16:55.859507 kubelet[2897]: I1213 14:16:55.859389 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/f5a3f4a9-fdfd-48cb-a792-bf6570e63fbf-calico-apiserver-certs\") pod \"calico-apiserver-5fbcf8bc7f-mnfv8\" (UID: \"f5a3f4a9-fdfd-48cb-a792-bf6570e63fbf\") " pod="calico-apiserver/calico-apiserver-5fbcf8bc7f-mnfv8" Dec 13 14:16:55.859507 kubelet[2897]: I1213 14:16:55.859444 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mbjqs\" (UniqueName: \"kubernetes.io/projected/f5a3f4a9-fdfd-48cb-a792-bf6570e63fbf-kube-api-access-mbjqs\") pod \"calico-apiserver-5fbcf8bc7f-mnfv8\" (UID: \"f5a3f4a9-fdfd-48cb-a792-bf6570e63fbf\") " pod="calico-apiserver/calico-apiserver-5fbcf8bc7f-mnfv8" Dec 13 14:16:55.859851 kubelet[2897]: I1213 14:16:55.859575 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lwd24\" (UniqueName: \"kubernetes.io/projected/c77b0a0c-a45a-4fdb-9438-06ec79198e34-kube-api-access-lwd24\") pod \"calico-apiserver-5fbcf8bc7f-l2sq4\" (UID: \"c77b0a0c-a45a-4fdb-9438-06ec79198e34\") " pod="calico-apiserver/calico-apiserver-5fbcf8bc7f-l2sq4" Dec 13 14:16:55.859851 kubelet[2897]: I1213 14:16:55.859634 2897 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/eaf54e69-06a6-44c4-9afc-ea6802f54674-config-volume\") pod \"coredns-7db6d8ff4d-7rpbw\" (UID: \"eaf54e69-06a6-44c4-9afc-ea6802f54674\") " pod="kube-system/coredns-7db6d8ff4d-7rpbw" Dec 13 14:16:56.045720 env[1824]: time="2024-12-13T14:16:56.045170418Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-56dc846f8d-88fpd,Uid:3fe07beb-f75f-4d6e-8ba9-f2ae93fab6db,Namespace:calico-system,Attempt:0,}" Dec 13 14:16:56.086805 env[1824]: time="2024-12-13T14:16:56.086246429Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5fbcf8bc7f-mnfv8,Uid:f5a3f4a9-fdfd-48cb-a792-bf6570e63fbf,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:16:56.101855 env[1824]: time="2024-12-13T14:16:56.101319387Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5fbcf8bc7f-l2sq4,Uid:c77b0a0c-a45a-4fdb-9438-06ec79198e34,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:16:56.289802 env[1824]: time="2024-12-13T14:16:56.289712355Z" level=info msg="shim disconnected" id=70d2d0297a606e3498dcc243aecf0eddf3a6e635bc4082af5b5cdc67d71c89bf Dec 13 14:16:56.290475 env[1824]: time="2024-12-13T14:16:56.290378642Z" level=warning msg="cleaning up after shim disconnected" id=70d2d0297a606e3498dcc243aecf0eddf3a6e635bc4082af5b5cdc67d71c89bf namespace=k8s.io Dec 13 14:16:56.290475 env[1824]: time="2024-12-13T14:16:56.290462990Z" level=info msg="cleaning up dead shim" Dec 13 14:16:56.320095 env[1824]: time="2024-12-13T14:16:56.319879848Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:16:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3639 runtime=io.containerd.runc.v2\n" Dec 13 14:16:56.340649 systemd[1]: Created slice kubepods-besteffort-pod7c2a7441_2ea6_4bca_a02f_c7e1fd939a3c.slice. Dec 13 14:16:56.348542 env[1824]: time="2024-12-13T14:16:56.348419626Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jcqpr,Uid:7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c,Namespace:calico-system,Attempt:0,}" Dec 13 14:16:56.611750 env[1824]: time="2024-12-13T14:16:56.611529999Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:16:56.673595 env[1824]: time="2024-12-13T14:16:56.673457432Z" level=error msg="Failed to destroy network for sandbox \"e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:56.684370 env[1824]: time="2024-12-13T14:16:56.678741699Z" level=error msg="encountered an error cleaning up failed sandbox \"e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:56.684370 env[1824]: time="2024-12-13T14:16:56.678893991Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-56dc846f8d-88fpd,Uid:3fe07beb-f75f-4d6e-8ba9-f2ae93fab6db,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:56.682696 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223-shm.mount: Deactivated successfully. Dec 13 14:16:56.688799 kubelet[2897]: E1213 14:16:56.684746 2897 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:56.688799 kubelet[2897]: E1213 14:16:56.684875 2897 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-56dc846f8d-88fpd" Dec 13 14:16:56.688799 kubelet[2897]: E1213 14:16:56.684929 2897 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-56dc846f8d-88fpd" Dec 13 14:16:56.691209 kubelet[2897]: E1213 14:16:56.685029 2897 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-56dc846f8d-88fpd_calico-system(3fe07beb-f75f-4d6e-8ba9-f2ae93fab6db)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-56dc846f8d-88fpd_calico-system(3fe07beb-f75f-4d6e-8ba9-f2ae93fab6db)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-56dc846f8d-88fpd" podUID="3fe07beb-f75f-4d6e-8ba9-f2ae93fab6db" Dec 13 14:16:56.699503 env[1824]: time="2024-12-13T14:16:56.699412052Z" level=error msg="Failed to destroy network for sandbox \"8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:56.712744 env[1824]: time="2024-12-13T14:16:56.704902383Z" level=error msg="encountered an error cleaning up failed sandbox \"8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:56.712744 env[1824]: time="2024-12-13T14:16:56.705048015Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5fbcf8bc7f-mnfv8,Uid:f5a3f4a9-fdfd-48cb-a792-bf6570e63fbf,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:56.708824 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187-shm.mount: Deactivated successfully. Dec 13 14:16:56.714663 kubelet[2897]: E1213 14:16:56.705442 2897 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:56.714663 kubelet[2897]: E1213 14:16:56.705516 2897 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5fbcf8bc7f-mnfv8" Dec 13 14:16:56.714663 kubelet[2897]: E1213 14:16:56.705553 2897 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5fbcf8bc7f-mnfv8" Dec 13 14:16:56.714901 kubelet[2897]: E1213 14:16:56.705614 2897 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5fbcf8bc7f-mnfv8_calico-apiserver(f5a3f4a9-fdfd-48cb-a792-bf6570e63fbf)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5fbcf8bc7f-mnfv8_calico-apiserver(f5a3f4a9-fdfd-48cb-a792-bf6570e63fbf)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5fbcf8bc7f-mnfv8" podUID="f5a3f4a9-fdfd-48cb-a792-bf6570e63fbf" Dec 13 14:16:56.719904 env[1824]: time="2024-12-13T14:16:56.719810318Z" level=error msg="Failed to destroy network for sandbox \"73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:56.728200 env[1824]: time="2024-12-13T14:16:56.726472268Z" level=error msg="encountered an error cleaning up failed sandbox \"73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:56.728200 env[1824]: time="2024-12-13T14:16:56.726585116Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jcqpr,Uid:7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:56.728572 kubelet[2897]: E1213 14:16:56.726875 2897 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:56.728572 kubelet[2897]: E1213 14:16:56.726951 2897 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-jcqpr" Dec 13 14:16:56.728572 kubelet[2897]: E1213 14:16:56.726992 2897 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-jcqpr" Dec 13 14:16:56.728942 kubelet[2897]: E1213 14:16:56.727747 2897 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-jcqpr_calico-system(7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-jcqpr_calico-system(7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-jcqpr" podUID="7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c" Dec 13 14:16:56.729670 env[1824]: time="2024-12-13T14:16:56.729534425Z" level=error msg="Failed to destroy network for sandbox \"39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:56.730138 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5-shm.mount: Deactivated successfully. Dec 13 14:16:56.737088 env[1824]: time="2024-12-13T14:16:56.735816648Z" level=error msg="encountered an error cleaning up failed sandbox \"39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:56.737760 env[1824]: time="2024-12-13T14:16:56.737595910Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5fbcf8bc7f-l2sq4,Uid:c77b0a0c-a45a-4fdb-9438-06ec79198e34,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:56.740427 kubelet[2897]: E1213 14:16:56.739749 2897 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:56.740427 kubelet[2897]: E1213 14:16:56.739907 2897 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5fbcf8bc7f-l2sq4" Dec 13 14:16:56.740427 kubelet[2897]: E1213 14:16:56.739942 2897 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5fbcf8bc7f-l2sq4" Dec 13 14:16:56.741407 kubelet[2897]: E1213 14:16:56.740074 2897 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5fbcf8bc7f-l2sq4_calico-apiserver(c77b0a0c-a45a-4fdb-9438-06ec79198e34)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5fbcf8bc7f-l2sq4_calico-apiserver(c77b0a0c-a45a-4fdb-9438-06ec79198e34)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5fbcf8bc7f-l2sq4" podUID="c77b0a0c-a45a-4fdb-9438-06ec79198e34" Dec 13 14:16:56.740743 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351-shm.mount: Deactivated successfully. Dec 13 14:16:56.922621 env[1824]: time="2024-12-13T14:16:56.919490847Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-xg6zq,Uid:beeed929-9ff9-469f-a97d-206e30099032,Namespace:kube-system,Attempt:0,}" Dec 13 14:16:56.999410 env[1824]: time="2024-12-13T14:16:56.999317584Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-7rpbw,Uid:eaf54e69-06a6-44c4-9afc-ea6802f54674,Namespace:kube-system,Attempt:0,}" Dec 13 14:16:57.071776 env[1824]: time="2024-12-13T14:16:57.071694320Z" level=error msg="Failed to destroy network for sandbox \"b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:57.072940 env[1824]: time="2024-12-13T14:16:57.072849679Z" level=error msg="encountered an error cleaning up failed sandbox \"b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:57.073369 env[1824]: time="2024-12-13T14:16:57.073282183Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-xg6zq,Uid:beeed929-9ff9-469f-a97d-206e30099032,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:57.074044 kubelet[2897]: E1213 14:16:57.073937 2897 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:57.074251 kubelet[2897]: E1213 14:16:57.074055 2897 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-xg6zq" Dec 13 14:16:57.074251 kubelet[2897]: E1213 14:16:57.074167 2897 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-xg6zq" Dec 13 14:16:57.076630 kubelet[2897]: E1213 14:16:57.074281 2897 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-xg6zq_kube-system(beeed929-9ff9-469f-a97d-206e30099032)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-xg6zq_kube-system(beeed929-9ff9-469f-a97d-206e30099032)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-xg6zq" podUID="beeed929-9ff9-469f-a97d-206e30099032" Dec 13 14:16:57.151076 env[1824]: time="2024-12-13T14:16:57.150978178Z" level=error msg="Failed to destroy network for sandbox \"d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:57.151788 env[1824]: time="2024-12-13T14:16:57.151713201Z" level=error msg="encountered an error cleaning up failed sandbox \"d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:57.151955 env[1824]: time="2024-12-13T14:16:57.151819869Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-7rpbw,Uid:eaf54e69-06a6-44c4-9afc-ea6802f54674,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:57.152300 kubelet[2897]: E1213 14:16:57.152226 2897 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:57.152445 kubelet[2897]: E1213 14:16:57.152329 2897 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-7rpbw" Dec 13 14:16:57.152445 kubelet[2897]: E1213 14:16:57.152385 2897 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-7rpbw" Dec 13 14:16:57.153160 kubelet[2897]: E1213 14:16:57.152488 2897 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-7rpbw_kube-system(eaf54e69-06a6-44c4-9afc-ea6802f54674)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-7rpbw_kube-system(eaf54e69-06a6-44c4-9afc-ea6802f54674)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-7rpbw" podUID="eaf54e69-06a6-44c4-9afc-ea6802f54674" Dec 13 14:16:57.614187 kubelet[2897]: I1213 14:16:57.613672 2897 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" Dec 13 14:16:57.616928 kubelet[2897]: I1213 14:16:57.616887 2897 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" Dec 13 14:16:57.618520 env[1824]: time="2024-12-13T14:16:57.618463816Z" level=info msg="StopPodSandbox for \"b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f\"" Dec 13 14:16:57.621152 env[1824]: time="2024-12-13T14:16:57.619060143Z" level=info msg="StopPodSandbox for \"8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187\"" Dec 13 14:16:57.625343 kubelet[2897]: I1213 14:16:57.625170 2897 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" Dec 13 14:16:57.627886 env[1824]: time="2024-12-13T14:16:57.627595352Z" level=info msg="StopPodSandbox for \"39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351\"" Dec 13 14:16:57.642034 kubelet[2897]: I1213 14:16:57.641283 2897 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" Dec 13 14:16:57.646768 env[1824]: time="2024-12-13T14:16:57.646685331Z" level=info msg="StopPodSandbox for \"d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac\"" Dec 13 14:16:57.654053 kubelet[2897]: I1213 14:16:57.650822 2897 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" Dec 13 14:16:57.657451 kubelet[2897]: I1213 14:16:57.657384 2897 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" Dec 13 14:16:57.658448 env[1824]: time="2024-12-13T14:16:57.658312732Z" level=info msg="StopPodSandbox for \"e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223\"" Dec 13 14:16:57.659242 env[1824]: time="2024-12-13T14:16:57.659172364Z" level=info msg="StopPodSandbox for \"73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5\"" Dec 13 14:16:57.760419 env[1824]: time="2024-12-13T14:16:57.760335550Z" level=error msg="StopPodSandbox for \"8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187\" failed" error="failed to destroy network for sandbox \"8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:57.761289 kubelet[2897]: E1213 14:16:57.760871 2897 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" Dec 13 14:16:57.761289 kubelet[2897]: E1213 14:16:57.760975 2897 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187"} Dec 13 14:16:57.761289 kubelet[2897]: E1213 14:16:57.761146 2897 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f5a3f4a9-fdfd-48cb-a792-bf6570e63fbf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:16:57.761289 kubelet[2897]: E1213 14:16:57.761214 2897 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f5a3f4a9-fdfd-48cb-a792-bf6570e63fbf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5fbcf8bc7f-mnfv8" podUID="f5a3f4a9-fdfd-48cb-a792-bf6570e63fbf" Dec 13 14:16:57.787832 env[1824]: time="2024-12-13T14:16:57.787714042Z" level=error msg="StopPodSandbox for \"d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac\" failed" error="failed to destroy network for sandbox \"d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:57.788859 kubelet[2897]: E1213 14:16:57.788418 2897 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" Dec 13 14:16:57.788859 kubelet[2897]: E1213 14:16:57.788519 2897 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac"} Dec 13 14:16:57.788859 kubelet[2897]: E1213 14:16:57.788616 2897 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"eaf54e69-06a6-44c4-9afc-ea6802f54674\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:16:57.788859 kubelet[2897]: E1213 14:16:57.788708 2897 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"eaf54e69-06a6-44c4-9afc-ea6802f54674\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-7rpbw" podUID="eaf54e69-06a6-44c4-9afc-ea6802f54674" Dec 13 14:16:57.886064 env[1824]: time="2024-12-13T14:16:57.883892097Z" level=error msg="StopPodSandbox for \"e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223\" failed" error="failed to destroy network for sandbox \"e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:57.887049 kubelet[2897]: E1213 14:16:57.886614 2897 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" Dec 13 14:16:57.887049 kubelet[2897]: E1213 14:16:57.886706 2897 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223"} Dec 13 14:16:57.887049 kubelet[2897]: E1213 14:16:57.886845 2897 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3fe07beb-f75f-4d6e-8ba9-f2ae93fab6db\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:16:57.887049 kubelet[2897]: E1213 14:16:57.886893 2897 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3fe07beb-f75f-4d6e-8ba9-f2ae93fab6db\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-56dc846f8d-88fpd" podUID="3fe07beb-f75f-4d6e-8ba9-f2ae93fab6db" Dec 13 14:16:57.887711 env[1824]: time="2024-12-13T14:16:57.886948122Z" level=error msg="StopPodSandbox for \"73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5\" failed" error="failed to destroy network for sandbox \"73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:57.888526 kubelet[2897]: E1213 14:16:57.888079 2897 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" Dec 13 14:16:57.888526 kubelet[2897]: E1213 14:16:57.888237 2897 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5"} Dec 13 14:16:57.888526 kubelet[2897]: E1213 14:16:57.888334 2897 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:16:57.888526 kubelet[2897]: E1213 14:16:57.888441 2897 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-jcqpr" podUID="7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c" Dec 13 14:16:57.896989 env[1824]: time="2024-12-13T14:16:57.896883837Z" level=error msg="StopPodSandbox for \"b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f\" failed" error="failed to destroy network for sandbox \"b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:57.897854 kubelet[2897]: E1213 14:16:57.897451 2897 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" Dec 13 14:16:57.897854 kubelet[2897]: E1213 14:16:57.897574 2897 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f"} Dec 13 14:16:57.897854 kubelet[2897]: E1213 14:16:57.897681 2897 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"beeed929-9ff9-469f-a97d-206e30099032\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:16:57.897854 kubelet[2897]: E1213 14:16:57.897751 2897 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"beeed929-9ff9-469f-a97d-206e30099032\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-xg6zq" podUID="beeed929-9ff9-469f-a97d-206e30099032" Dec 13 14:16:57.904360 env[1824]: time="2024-12-13T14:16:57.904251351Z" level=error msg="StopPodSandbox for \"39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351\" failed" error="failed to destroy network for sandbox \"39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:16:57.905225 kubelet[2897]: E1213 14:16:57.904859 2897 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" Dec 13 14:16:57.905225 kubelet[2897]: E1213 14:16:57.904965 2897 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351"} Dec 13 14:16:57.905225 kubelet[2897]: E1213 14:16:57.905044 2897 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c77b0a0c-a45a-4fdb-9438-06ec79198e34\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:16:57.905225 kubelet[2897]: E1213 14:16:57.905143 2897 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c77b0a0c-a45a-4fdb-9438-06ec79198e34\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5fbcf8bc7f-l2sq4" podUID="c77b0a0c-a45a-4fdb-9438-06ec79198e34" Dec 13 14:17:04.429906 systemd[1]: Started sshd@7-172.31.24.217:22-139.178.89.65:50180.service. Dec 13 14:17:04.441880 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:17:04.441975 kernel: audit: type=1130 audit(1734099424.429:1019): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.24.217:22-139.178.89.65:50180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:04.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.24.217:22-139.178.89.65:50180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:04.613000 audit[3958]: USER_ACCT pid=3958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:04.614926 sshd[3958]: Accepted publickey for core from 139.178.89.65 port 50180 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:04.618908 sshd[3958]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:04.613000 audit[3958]: CRED_ACQ pid=3958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:04.633947 kernel: audit: type=1101 audit(1734099424.613:1020): pid=3958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:04.634265 kernel: audit: type=1103 audit(1734099424.613:1021): pid=3958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:04.640672 kernel: audit: type=1006 audit(1734099424.613:1022): pid=3958 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Dec 13 14:17:04.613000 audit[3958]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcb6cd6e0 a2=3 a3=1 items=0 ppid=1 pid=3958 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:04.651089 kernel: audit: type=1300 audit(1734099424.613:1022): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcb6cd6e0 a2=3 a3=1 items=0 ppid=1 pid=3958 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:04.613000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:04.656982 kernel: audit: type=1327 audit(1734099424.613:1022): proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:04.657312 systemd-logind[1805]: New session 8 of user core. Dec 13 14:17:04.657838 systemd[1]: Started session-8.scope. Dec 13 14:17:04.670000 audit[3958]: USER_START pid=3958 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:04.694317 kernel: audit: type=1105 audit(1734099424.670:1023): pid=3958 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:04.694544 kernel: audit: type=1103 audit(1734099424.684:1024): pid=3960 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:04.684000 audit[3960]: CRED_ACQ pid=3960 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:05.004562 sshd[3958]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:05.007000 audit[3958]: USER_END pid=3958 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:05.022463 systemd[1]: sshd@7-172.31.24.217:22-139.178.89.65:50180.service: Deactivated successfully. Dec 13 14:17:05.023912 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:17:05.033550 kernel: audit: type=1106 audit(1734099425.007:1025): pid=3958 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:05.033694 kernel: audit: type=1104 audit(1734099425.007:1026): pid=3958 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:05.007000 audit[3958]: CRED_DISP pid=3958 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:05.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.24.217:22-139.178.89.65:50180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:05.035360 systemd-logind[1805]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:17:05.038315 systemd-logind[1805]: Removed session 8. Dec 13 14:17:06.120654 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1411083074.mount: Deactivated successfully. Dec 13 14:17:06.220955 env[1824]: time="2024-12-13T14:17:06.220894576Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:06.228274 env[1824]: time="2024-12-13T14:17:06.228192214Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:06.234048 env[1824]: time="2024-12-13T14:17:06.233981281Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:06.239731 env[1824]: time="2024-12-13T14:17:06.239663303Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:06.242938 env[1824]: time="2024-12-13T14:17:06.241635782Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758\"" Dec 13 14:17:06.286058 env[1824]: time="2024-12-13T14:17:06.285962253Z" level=info msg="CreateContainer within sandbox \"afcef961a8006e0fe0b7c5d2953993cfb77b1f1f0543a2ba7d37ca34efa10fe4\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:17:06.323103 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3926188219.mount: Deactivated successfully. Dec 13 14:17:06.330201 env[1824]: time="2024-12-13T14:17:06.330015639Z" level=info msg="CreateContainer within sandbox \"afcef961a8006e0fe0b7c5d2953993cfb77b1f1f0543a2ba7d37ca34efa10fe4\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"ba32901cf72a70b3cd1512697fbe4db89aaed9248d9e0a2c225edb89bdc0281e\"" Dec 13 14:17:06.333940 env[1824]: time="2024-12-13T14:17:06.333308820Z" level=info msg="StartContainer for \"ba32901cf72a70b3cd1512697fbe4db89aaed9248d9e0a2c225edb89bdc0281e\"" Dec 13 14:17:06.379749 systemd[1]: Started cri-containerd-ba32901cf72a70b3cd1512697fbe4db89aaed9248d9e0a2c225edb89bdc0281e.scope. Dec 13 14:17:06.439000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.439000 audit[3982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3307 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:06.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333239303163663732613730623363643135313236393766626534 Dec 13 14:17:06.439000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.439000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.439000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.439000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.439000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.439000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.439000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.439000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.439000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.439000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.439000 audit: BPF prog-id=142 op=LOAD Dec 13 14:17:06.439000 audit[3982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3307 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:06.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333239303163663732613730623363643135313236393766626534 Dec 13 14:17:06.439000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.439000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.439000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.439000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.439000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.439000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.439000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.439000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.439000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.439000 audit: BPF prog-id=143 op=LOAD Dec 13 14:17:06.439000 audit[3982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3307 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:06.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333239303163663732613730623363643135313236393766626534 Dec 13 14:17:06.444000 audit: BPF prog-id=143 op=UNLOAD Dec 13 14:17:06.444000 audit: BPF prog-id=142 op=UNLOAD Dec 13 14:17:06.444000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.444000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.444000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.444000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.444000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.444000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.444000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.444000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.444000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.444000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:06.444000 audit: BPF prog-id=144 op=LOAD Dec 13 14:17:06.444000 audit[3982]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3307 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:06.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333239303163663732613730623363643135313236393766626534 Dec 13 14:17:06.483090 env[1824]: time="2024-12-13T14:17:06.482968868Z" level=info msg="StartContainer for \"ba32901cf72a70b3cd1512697fbe4db89aaed9248d9e0a2c225edb89bdc0281e\" returns successfully" Dec 13 14:17:06.639568 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:17:06.639798 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:17:08.545000 audit[4141]: AVC avc: denied { write } for pid=4141 comm="tee" name="fd" dev="proc" ino=21369 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:17:08.545000 audit[4141]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffa0eda21 a2=241 a3=1b6 items=1 ppid=4104 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:08.545000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:17:08.545000 audit: PATH item=0 name="/dev/fd/63" inode=21776 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:08.545000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:17:08.559000 audit[4126]: AVC avc: denied { write } for pid=4126 comm="tee" name="fd" dev="proc" ino=21793 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:17:08.559000 audit[4126]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd0a66a20 a2=241 a3=1b6 items=1 ppid=4091 pid=4126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:08.559000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:17:08.559000 audit: PATH item=0 name="/dev/fd/63" inode=21358 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:08.559000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:17:08.564000 audit[4137]: AVC avc: denied { write } for pid=4137 comm="tee" name="fd" dev="proc" ino=21796 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:17:08.564000 audit[4137]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd304da11 a2=241 a3=1b6 items=1 ppid=4102 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:08.564000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:17:08.564000 audit: PATH item=0 name="/dev/fd/63" inode=21365 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:08.564000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:17:08.568000 audit[4139]: AVC avc: denied { write } for pid=4139 comm="tee" name="fd" dev="proc" ino=21802 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:17:08.568000 audit[4139]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd9935a20 a2=241 a3=1b6 items=1 ppid=4094 pid=4139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:08.568000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:17:08.568000 audit: PATH item=0 name="/dev/fd/63" inode=21774 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:08.568000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:17:08.619000 audit[4159]: AVC avc: denied { write } for pid=4159 comm="tee" name="fd" dev="proc" ino=21376 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:17:08.619000 audit[4159]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc89bca10 a2=241 a3=1b6 items=1 ppid=4098 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:08.619000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:17:08.619000 audit: PATH item=0 name="/dev/fd/63" inode=21795 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:08.619000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:17:08.621000 audit[4149]: AVC avc: denied { write } for pid=4149 comm="tee" name="fd" dev="proc" ino=21814 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:17:08.621000 audit[4149]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc3522a20 a2=241 a3=1b6 items=1 ppid=4099 pid=4149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:08.621000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:17:08.621000 audit: PATH item=0 name="/dev/fd/63" inode=21366 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:08.621000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:17:08.628000 audit[4165]: AVC avc: denied { write } for pid=4165 comm="tee" name="fd" dev="proc" ino=21818 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:17:08.628000 audit[4165]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff7c25a22 a2=241 a3=1b6 items=1 ppid=4096 pid=4165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:08.628000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:17:08.628000 audit: PATH item=0 name="/dev/fd/63" inode=21373 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:08.628000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:17:09.082000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.082000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.082000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.082000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.082000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.082000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.082000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.082000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.082000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.082000 audit: BPF prog-id=145 op=LOAD Dec 13 14:17:09.082000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff43543a8 a2=98 a3=fffff4354398 items=0 ppid=4092 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.082000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:09.083000 audit: BPF prog-id=145 op=UNLOAD Dec 13 14:17:09.085000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.085000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.085000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.085000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.085000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.085000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.085000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.085000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.085000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.085000 audit: BPF prog-id=146 op=LOAD Dec 13 14:17:09.085000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff4354038 a2=74 a3=95 items=0 ppid=4092 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.085000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:09.086000 audit: BPF prog-id=146 op=UNLOAD Dec 13 14:17:09.086000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.086000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.086000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.086000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.086000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.086000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.086000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.086000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.086000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.086000 audit: BPF prog-id=147 op=LOAD Dec 13 14:17:09.086000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff4354098 a2=94 a3=2 items=0 ppid=4092 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.086000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:09.089000 audit: BPF prog-id=147 op=UNLOAD Dec 13 14:17:09.319000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.319000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.319000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.319000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.319000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.319000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.319000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.319000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.319000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.319000 audit: BPF prog-id=148 op=LOAD Dec 13 14:17:09.319000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff4354058 a2=40 a3=fffff4354088 items=0 ppid=4092 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.319000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:09.320000 audit: BPF prog-id=148 op=UNLOAD Dec 13 14:17:09.320000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.320000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffff4354170 a2=50 a3=0 items=0 ppid=4092 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:09.338000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.338000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff43540c8 a2=28 a3=fffff43541f8 items=0 ppid=4092 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.338000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:09.338000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.338000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff43540f8 a2=28 a3=fffff4354228 items=0 ppid=4092 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.338000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:09.339000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.339000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff4353fa8 a2=28 a3=fffff43540d8 items=0 ppid=4092 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.339000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:09.339000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.339000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff4354118 a2=28 a3=fffff4354248 items=0 ppid=4092 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.339000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:09.343000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.343000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff43540f8 a2=28 a3=fffff4354228 items=0 ppid=4092 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.343000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:09.343000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.343000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff43540e8 a2=28 a3=fffff4354218 items=0 ppid=4092 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.343000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:09.343000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.343000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff4354118 a2=28 a3=fffff4354248 items=0 ppid=4092 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.343000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:09.343000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.343000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff43540f8 a2=28 a3=fffff4354228 items=0 ppid=4092 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.343000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:09.343000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.343000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff4354118 a2=28 a3=fffff4354248 items=0 ppid=4092 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.343000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:09.343000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.343000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff43540e8 a2=28 a3=fffff4354218 items=0 ppid=4092 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.343000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:09.343000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.343000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff4354168 a2=28 a3=fffff43542a8 items=0 ppid=4092 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.343000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:09.344000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.344000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff4353ea0 a2=50 a3=0 items=0 ppid=4092 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.344000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:09.344000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.344000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.344000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.344000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.344000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.344000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.344000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.344000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.344000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.344000 audit: BPF prog-id=149 op=LOAD Dec 13 14:17:09.344000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff4353ea8 a2=94 a3=5 items=0 ppid=4092 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.344000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:09.344000 audit: BPF prog-id=149 op=UNLOAD Dec 13 14:17:09.344000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.344000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff4353fb0 a2=50 a3=0 items=0 ppid=4092 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.344000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:09.344000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.344000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffff43540f8 a2=4 a3=3 items=0 ppid=4092 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.344000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:09.344000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.344000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.344000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.344000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.344000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.344000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.344000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.344000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.344000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.344000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.344000 audit[4199]: AVC avc: denied { confidentiality } for pid=4199 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:09.344000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff43540d8 a2=94 a3=6 items=0 ppid=4092 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.344000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:09.345000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.345000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.345000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.345000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.345000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.345000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.345000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.345000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.345000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.345000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.345000 audit[4199]: AVC avc: denied { confidentiality } for pid=4199 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:09.345000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff43538a8 a2=94 a3=83 items=0 ppid=4092 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.345000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:09.346000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.346000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.346000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.346000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.346000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.346000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.346000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.346000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.346000 audit[4199]: AVC avc: denied { perfmon } for pid=4199 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.346000 audit[4199]: AVC avc: denied { bpf } for pid=4199 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.346000 audit[4199]: AVC avc: denied { confidentiality } for pid=4199 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:09.346000 audit[4199]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff43538a8 a2=94 a3=83 items=0 ppid=4092 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.346000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:09.368000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.368000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.368000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.368000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.368000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.368000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.368000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.368000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.368000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.368000 audit: BPF prog-id=150 op=LOAD Dec 13 14:17:09.368000 audit[4204]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc0b352c8 a2=98 a3=ffffc0b352b8 items=0 ppid=4092 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.368000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:17:09.369000 audit: BPF prog-id=150 op=UNLOAD Dec 13 14:17:09.369000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.369000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.369000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.369000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.369000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.369000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.369000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.369000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.369000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.369000 audit: BPF prog-id=151 op=LOAD Dec 13 14:17:09.369000 audit[4204]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc0b35178 a2=74 a3=95 items=0 ppid=4092 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.369000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:17:09.369000 audit: BPF prog-id=151 op=UNLOAD Dec 13 14:17:09.369000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.369000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.369000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.369000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.369000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.369000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.369000 audit[4204]: AVC avc: denied { perfmon } for pid=4204 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.369000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.369000 audit[4204]: AVC avc: denied { bpf } for pid=4204 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.369000 audit: BPF prog-id=152 op=LOAD Dec 13 14:17:09.369000 audit[4204]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc0b351a8 a2=40 a3=ffffc0b351d8 items=0 ppid=4092 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.369000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:17:09.369000 audit: BPF prog-id=152 op=UNLOAD Dec 13 14:17:09.496049 (udev-worker)[4015]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:17:09.510262 systemd-networkd[1536]: vxlan.calico: Link UP Dec 13 14:17:09.510282 systemd-networkd[1536]: vxlan.calico: Gained carrier Dec 13 14:17:09.561000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.564378 kernel: kauditd_printk_skb: 267 callbacks suppressed Dec 13 14:17:09.564691 kernel: audit: type=1400 audit(1734099429.561:1075): avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.561000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.576203 (udev-worker)[4235]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:17:09.583057 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:17:09.583454 kernel: audit: type=1400 audit(1734099429.561:1075): avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.561000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.595531 kernel: audit: type=1400 audit(1734099429.561:1075): avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.607696 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:17:09.616203 kernel: audit: backlog limit exceeded Dec 13 14:17:09.616346 kernel: audit: type=1400 audit(1734099429.561:1075): avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.561000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.561000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.561000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.641721 kernel: audit: type=1400 audit(1734099429.561:1075): avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.641880 kernel: audit: type=1400 audit(1734099429.561:1075): avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.561000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.651356 kernel: audit: type=1400 audit(1734099429.561:1075): avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.561000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.561000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.561000 audit: BPF prog-id=153 op=LOAD Dec 13 14:17:09.561000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd21ac8a8 a2=98 a3=ffffd21ac898 items=0 ppid=4092 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.561000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:09.571000 audit: BPF prog-id=153 op=UNLOAD Dec 13 14:17:09.572000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.572000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.572000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.572000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.572000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.572000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.572000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.572000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.572000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.572000 audit: BPF prog-id=154 op=LOAD Dec 13 14:17:09.572000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd21ac588 a2=74 a3=95 items=0 ppid=4092 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.572000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:09.572000 audit: BPF prog-id=154 op=UNLOAD Dec 13 14:17:09.572000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.572000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.572000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.572000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.572000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.572000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.572000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.572000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.572000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.572000 audit: BPF prog-id=155 op=LOAD Dec 13 14:17:09.572000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd21ac5e8 a2=94 a3=2 items=0 ppid=4092 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.572000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:09.572000 audit: BPF prog-id=155 op=UNLOAD Dec 13 14:17:09.572000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.572000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd21ac618 a2=28 a3=ffffd21ac748 items=0 ppid=4092 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.572000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:09.572000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.572000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd21ac648 a2=28 a3=ffffd21ac778 items=0 ppid=4092 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.572000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:09.572000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.572000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd21ac4f8 a2=28 a3=ffffd21ac628 items=0 ppid=4092 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.572000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:09.572000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.572000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd21ac668 a2=28 a3=ffffd21ac798 items=0 ppid=4092 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.572000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:09.572000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.572000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd21ac648 a2=28 a3=ffffd21ac778 items=0 ppid=4092 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.572000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:09.572000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.572000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd21ac638 a2=28 a3=ffffd21ac768 items=0 ppid=4092 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.572000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:09.619000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.619000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd21ac648 a2=28 a3=ffffd21ac778 items=0 ppid=4092 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.619000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:09.651000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.651000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd21ac668 a2=28 a3=ffffd21ac798 items=0 ppid=4092 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.651000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:09.651000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.651000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd21ac638 a2=28 a3=ffffd21ac768 items=0 ppid=4092 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.651000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:09.651000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.651000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd21ac6b8 a2=28 a3=ffffd21ac7f8 items=0 ppid=4092 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.651000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:09.651000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.651000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.651000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.651000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.651000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.651000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.651000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.651000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.651000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.651000 audit: BPF prog-id=156 op=LOAD Dec 13 14:17:09.651000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd21ac4d8 a2=40 a3=ffffd21ac508 items=0 ppid=4092 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.651000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:09.651000 audit: BPF prog-id=156 op=UNLOAD Dec 13 14:17:09.658000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.658000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffd21ac500 a2=50 a3=0 items=0 ppid=4092 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.658000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:09.658000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.658000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffd21ac500 a2=50 a3=0 items=0 ppid=4092 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.658000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:09.658000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.658000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.658000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.658000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.658000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.658000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.658000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.658000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.658000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.658000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.658000 audit: BPF prog-id=157 op=LOAD Dec 13 14:17:09.658000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd21abc68 a2=94 a3=2 items=0 ppid=4092 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.658000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:09.661000 audit: BPF prog-id=157 op=UNLOAD Dec 13 14:17:09.661000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.661000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.661000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.661000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.661000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.661000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.661000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.661000 audit[4234]: AVC avc: denied { perfmon } for pid=4234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.661000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.661000 audit[4234]: AVC avc: denied { bpf } for pid=4234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.661000 audit: BPF prog-id=158 op=LOAD Dec 13 14:17:09.661000 audit[4234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd21abdf8 a2=94 a3=2d items=0 ppid=4092 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.661000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:09.668000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.668000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.668000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.668000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.668000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.668000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.668000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.668000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.668000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.668000 audit: BPF prog-id=159 op=LOAD Dec 13 14:17:09.668000 audit[4241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc4fd9408 a2=98 a3=ffffc4fd93f8 items=0 ppid=4092 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.668000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:09.668000 audit: BPF prog-id=159 op=UNLOAD Dec 13 14:17:09.668000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.668000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.668000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.668000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.668000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.668000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.668000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.668000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.668000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.668000 audit: BPF prog-id=160 op=LOAD Dec 13 14:17:09.668000 audit[4241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc4fd9098 a2=74 a3=95 items=0 ppid=4092 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.668000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:09.669000 audit: BPF prog-id=160 op=UNLOAD Dec 13 14:17:09.669000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.669000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.669000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.669000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.669000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.669000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.669000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.669000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.669000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.669000 audit: BPF prog-id=161 op=LOAD Dec 13 14:17:09.669000 audit[4241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc4fd90f8 a2=94 a3=2 items=0 ppid=4092 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.669000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:09.669000 audit: BPF prog-id=161 op=UNLOAD Dec 13 14:17:09.896000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.896000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.896000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.896000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.896000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.896000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.896000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.896000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.896000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.896000 audit: BPF prog-id=162 op=LOAD Dec 13 14:17:09.896000 audit[4241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc4fd90b8 a2=40 a3=ffffc4fd90e8 items=0 ppid=4092 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.896000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:09.897000 audit: BPF prog-id=162 op=UNLOAD Dec 13 14:17:09.897000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.897000 audit[4241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc4fd91d0 a2=50 a3=0 items=0 ppid=4092 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.897000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:09.923000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.923000 audit[4241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc4fd9128 a2=28 a3=ffffc4fd9258 items=0 ppid=4092 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.923000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:09.924000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.924000 audit[4241]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc4fd9158 a2=28 a3=ffffc4fd9288 items=0 ppid=4092 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.924000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:09.924000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.924000 audit[4241]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc4fd9008 a2=28 a3=ffffc4fd9138 items=0 ppid=4092 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.924000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:09.925000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.925000 audit[4241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc4fd9178 a2=28 a3=ffffc4fd92a8 items=0 ppid=4092 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.925000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:09.925000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.925000 audit[4241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc4fd9158 a2=28 a3=ffffc4fd9288 items=0 ppid=4092 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.925000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:09.930000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.930000 audit[4241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc4fd9148 a2=28 a3=ffffc4fd9278 items=0 ppid=4092 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.930000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:09.931000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.931000 audit[4241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc4fd9178 a2=28 a3=ffffc4fd92a8 items=0 ppid=4092 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.931000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:09.932000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.932000 audit[4241]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc4fd9158 a2=28 a3=ffffc4fd9288 items=0 ppid=4092 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.932000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:09.932000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.932000 audit[4241]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc4fd9178 a2=28 a3=ffffc4fd92a8 items=0 ppid=4092 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.932000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:09.933000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.933000 audit[4241]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc4fd9148 a2=28 a3=ffffc4fd9278 items=0 ppid=4092 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.933000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:09.933000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.933000 audit[4241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc4fd91c8 a2=28 a3=ffffc4fd9308 items=0 ppid=4092 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.933000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:09.934000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.934000 audit[4241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc4fd8f00 a2=50 a3=0 items=0 ppid=4092 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.934000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:09.935000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.935000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.935000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.935000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.935000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.935000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.935000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.935000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.935000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.935000 audit: BPF prog-id=163 op=LOAD Dec 13 14:17:09.935000 audit[4241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc4fd8f08 a2=94 a3=5 items=0 ppid=4092 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.935000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:09.936000 audit: BPF prog-id=163 op=UNLOAD Dec 13 14:17:09.937000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.937000 audit[4241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc4fd9010 a2=50 a3=0 items=0 ppid=4092 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.937000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:09.937000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.937000 audit[4241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffc4fd9158 a2=4 a3=3 items=0 ppid=4092 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.937000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:09.937000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.937000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.937000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.937000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.937000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.937000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.937000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.937000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.937000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.937000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.937000 audit[4241]: AVC avc: denied { confidentiality } for pid=4241 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:09.937000 audit[4241]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc4fd9138 a2=94 a3=6 items=0 ppid=4092 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.937000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:09.940000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.940000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.940000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.940000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.940000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.940000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.940000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.940000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.940000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.940000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.940000 audit[4241]: AVC avc: denied { confidentiality } for pid=4241 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:09.940000 audit[4241]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc4fd8908 a2=94 a3=83 items=0 ppid=4092 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.940000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:09.942000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.942000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.942000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.942000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.942000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.942000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.942000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.942000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.942000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.942000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.942000 audit[4241]: AVC avc: denied { confidentiality } for pid=4241 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:09.942000 audit[4241]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc4fd8908 a2=94 a3=83 items=0 ppid=4092 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.942000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:09.944000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.944000 audit[4241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc4fda348 a2=10 a3=ffffc4fda438 items=0 ppid=4092 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.944000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:09.944000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.944000 audit[4241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc4fda208 a2=10 a3=ffffc4fda2f8 items=0 ppid=4092 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.944000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:09.944000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.944000 audit[4241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc4fda178 a2=10 a3=ffffc4fda2f8 items=0 ppid=4092 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.944000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:09.945000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:09.945000 audit[4241]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc4fda178 a2=10 a3=ffffc4fda2f8 items=0 ppid=4092 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:09.945000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:09.953000 audit: BPF prog-id=158 op=UNLOAD Dec 13 14:17:10.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.24.217:22-139.178.89.65:40870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:10.042748 systemd[1]: Started sshd@8-172.31.24.217:22-139.178.89.65:40870.service. Dec 13 14:17:10.118000 audit[4265]: NETFILTER_CFG table=raw:97 family=2 entries=21 op=nft_register_chain pid=4265 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:10.119000 audit[4266]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=4266 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:10.119000 audit[4266]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffe3273900 a2=0 a3=ffffab31afa8 items=0 ppid=4092 pid=4266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:10.119000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:10.118000 audit[4265]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffce67c560 a2=0 a3=ffff85359fa8 items=0 ppid=4092 pid=4265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:10.118000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:10.123000 audit[4267]: NETFILTER_CFG table=mangle:99 family=2 entries=16 op=nft_register_chain pid=4267 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:10.123000 audit[4267]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffe12fba50 a2=0 a3=ffff85bf7fa8 items=0 ppid=4092 pid=4267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:10.123000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:10.141000 audit[4268]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=4268 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:10.141000 audit[4268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffc5301b40 a2=0 a3=ffff80b19fa8 items=0 ppid=4092 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:10.141000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:10.241000 audit[4255]: USER_ACCT pid=4255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:10.245185 sshd[4255]: Accepted publickey for core from 139.178.89.65 port 40870 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:10.244000 audit[4255]: CRED_ACQ pid=4255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:10.245000 audit[4255]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc36f45f0 a2=3 a3=1 items=0 ppid=1 pid=4255 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:10.245000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:10.247503 sshd[4255]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:10.257870 systemd[1]: Started session-9.scope. Dec 13 14:17:10.258691 systemd-logind[1805]: New session 9 of user core. Dec 13 14:17:10.267000 audit[4255]: USER_START pid=4255 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:10.271000 audit[4276]: CRED_ACQ pid=4276 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:10.331025 env[1824]: time="2024-12-13T14:17:10.327825805Z" level=info msg="StopPodSandbox for \"73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5\"" Dec 13 14:17:10.331868 env[1824]: time="2024-12-13T14:17:10.330790394Z" level=info msg="StopPodSandbox for \"d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac\"" Dec 13 14:17:10.331868 env[1824]: time="2024-12-13T14:17:10.331526735Z" level=info msg="StopPodSandbox for \"39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351\"" Dec 13 14:17:10.332630 env[1824]: time="2024-12-13T14:17:10.332310070Z" level=info msg="StopPodSandbox for \"b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f\"" Dec 13 14:17:10.686771 sshd[4255]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:10.688000 audit[4255]: USER_END pid=4255 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:10.689000 audit[4255]: CRED_DISP pid=4255 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:10.692953 systemd[1]: sshd@8-172.31.24.217:22-139.178.89.65:40870.service: Deactivated successfully. Dec 13 14:17:10.694412 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:17:10.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.24.217:22-139.178.89.65:40870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:10.695857 systemd-logind[1805]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:17:10.698941 systemd-logind[1805]: Removed session 9. Dec 13 14:17:10.735313 kubelet[2897]: I1213 14:17:10.735228 2897 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-rnv2r" podStartSLOduration=5.641751154 podStartE2EDuration="28.731011708s" podCreationTimestamp="2024-12-13 14:16:42 +0000 UTC" firstStartedPulling="2024-12-13 14:16:43.155317536 +0000 UTC m=+24.134920887" lastFinishedPulling="2024-12-13 14:17:06.244578102 +0000 UTC m=+47.224181441" observedRunningTime="2024-12-13 14:17:06.77342155 +0000 UTC m=+47.753025033" watchObservedRunningTime="2024-12-13 14:17:10.731011708 +0000 UTC m=+51.710615071" Dec 13 14:17:10.901496 env[1824]: 2024-12-13 14:17:10.750 [INFO][4340] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" Dec 13 14:17:10.901496 env[1824]: 2024-12-13 14:17:10.750 [INFO][4340] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" iface="eth0" netns="/var/run/netns/cni-3894790b-8799-fcd4-d764-8ca508844055" Dec 13 14:17:10.901496 env[1824]: 2024-12-13 14:17:10.751 [INFO][4340] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" iface="eth0" netns="/var/run/netns/cni-3894790b-8799-fcd4-d764-8ca508844055" Dec 13 14:17:10.901496 env[1824]: 2024-12-13 14:17:10.751 [INFO][4340] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" iface="eth0" netns="/var/run/netns/cni-3894790b-8799-fcd4-d764-8ca508844055" Dec 13 14:17:10.901496 env[1824]: 2024-12-13 14:17:10.751 [INFO][4340] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" Dec 13 14:17:10.901496 env[1824]: 2024-12-13 14:17:10.751 [INFO][4340] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" Dec 13 14:17:10.901496 env[1824]: 2024-12-13 14:17:10.859 [INFO][4375] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" HandleID="k8s-pod-network.73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" Workload="ip--172--31--24--217-k8s-csi--node--driver--jcqpr-eth0" Dec 13 14:17:10.901496 env[1824]: 2024-12-13 14:17:10.859 [INFO][4375] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:10.901496 env[1824]: 2024-12-13 14:17:10.860 [INFO][4375] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:10.901496 env[1824]: 2024-12-13 14:17:10.875 [WARNING][4375] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" HandleID="k8s-pod-network.73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" Workload="ip--172--31--24--217-k8s-csi--node--driver--jcqpr-eth0" Dec 13 14:17:10.901496 env[1824]: 2024-12-13 14:17:10.875 [INFO][4375] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" HandleID="k8s-pod-network.73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" Workload="ip--172--31--24--217-k8s-csi--node--driver--jcqpr-eth0" Dec 13 14:17:10.901496 env[1824]: 2024-12-13 14:17:10.878 [INFO][4375] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:10.901496 env[1824]: 2024-12-13 14:17:10.898 [INFO][4340] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" Dec 13 14:17:10.909154 env[1824]: time="2024-12-13T14:17:10.909064786Z" level=info msg="TearDown network for sandbox \"73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5\" successfully" Dec 13 14:17:10.909477 env[1824]: time="2024-12-13T14:17:10.909373080Z" level=info msg="StopPodSandbox for \"73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5\" returns successfully" Dec 13 14:17:10.914383 systemd[1]: run-netns-cni\x2d3894790b\x2d8799\x2dfcd4\x2dd764\x2d8ca508844055.mount: Deactivated successfully. Dec 13 14:17:10.921380 env[1824]: time="2024-12-13T14:17:10.921303236Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jcqpr,Uid:7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c,Namespace:calico-system,Attempt:1,}" Dec 13 14:17:11.015212 env[1824]: 2024-12-13 14:17:10.793 [INFO][4345] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" Dec 13 14:17:11.015212 env[1824]: 2024-12-13 14:17:10.794 [INFO][4345] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" iface="eth0" netns="/var/run/netns/cni-47719b37-e56f-cc31-3085-5acbe3960063" Dec 13 14:17:11.015212 env[1824]: 2024-12-13 14:17:10.794 [INFO][4345] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" iface="eth0" netns="/var/run/netns/cni-47719b37-e56f-cc31-3085-5acbe3960063" Dec 13 14:17:11.015212 env[1824]: 2024-12-13 14:17:10.794 [INFO][4345] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" iface="eth0" netns="/var/run/netns/cni-47719b37-e56f-cc31-3085-5acbe3960063" Dec 13 14:17:11.015212 env[1824]: 2024-12-13 14:17:10.794 [INFO][4345] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" Dec 13 14:17:11.015212 env[1824]: 2024-12-13 14:17:10.794 [INFO][4345] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" Dec 13 14:17:11.015212 env[1824]: 2024-12-13 14:17:10.943 [INFO][4379] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" HandleID="k8s-pod-network.b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" Workload="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--xg6zq-eth0" Dec 13 14:17:11.015212 env[1824]: 2024-12-13 14:17:10.944 [INFO][4379] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:11.015212 env[1824]: 2024-12-13 14:17:10.944 [INFO][4379] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:11.015212 env[1824]: 2024-12-13 14:17:10.969 [WARNING][4379] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" HandleID="k8s-pod-network.b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" Workload="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--xg6zq-eth0" Dec 13 14:17:11.015212 env[1824]: 2024-12-13 14:17:10.969 [INFO][4379] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" HandleID="k8s-pod-network.b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" Workload="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--xg6zq-eth0" Dec 13 14:17:11.015212 env[1824]: 2024-12-13 14:17:10.993 [INFO][4379] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:11.015212 env[1824]: 2024-12-13 14:17:11.011 [INFO][4345] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" Dec 13 14:17:11.023207 systemd[1]: run-netns-cni\x2d47719b37\x2de56f\x2dcc31\x2d3085\x2d5acbe3960063.mount: Deactivated successfully. Dec 13 14:17:11.031399 env[1824]: time="2024-12-13T14:17:11.031319605Z" level=info msg="TearDown network for sandbox \"b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f\" successfully" Dec 13 14:17:11.031601 env[1824]: time="2024-12-13T14:17:11.031386052Z" level=info msg="StopPodSandbox for \"b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f\" returns successfully" Dec 13 14:17:11.032802 env[1824]: time="2024-12-13T14:17:11.032719214Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-xg6zq,Uid:beeed929-9ff9-469f-a97d-206e30099032,Namespace:kube-system,Attempt:1,}" Dec 13 14:17:11.056044 env[1824]: 2024-12-13 14:17:10.738 [INFO][4350] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" Dec 13 14:17:11.056044 env[1824]: 2024-12-13 14:17:10.738 [INFO][4350] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" iface="eth0" netns="/var/run/netns/cni-90ff404b-78e6-7a50-b7ca-3731ef0799e8" Dec 13 14:17:11.056044 env[1824]: 2024-12-13 14:17:10.740 [INFO][4350] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" iface="eth0" netns="/var/run/netns/cni-90ff404b-78e6-7a50-b7ca-3731ef0799e8" Dec 13 14:17:11.056044 env[1824]: 2024-12-13 14:17:10.742 [INFO][4350] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" iface="eth0" netns="/var/run/netns/cni-90ff404b-78e6-7a50-b7ca-3731ef0799e8" Dec 13 14:17:11.056044 env[1824]: 2024-12-13 14:17:10.742 [INFO][4350] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" Dec 13 14:17:11.056044 env[1824]: 2024-12-13 14:17:10.742 [INFO][4350] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" Dec 13 14:17:11.056044 env[1824]: 2024-12-13 14:17:10.930 [INFO][4370] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" HandleID="k8s-pod-network.d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" Workload="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--7rpbw-eth0" Dec 13 14:17:11.056044 env[1824]: 2024-12-13 14:17:10.932 [INFO][4370] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:11.056044 env[1824]: 2024-12-13 14:17:10.994 [INFO][4370] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:11.056044 env[1824]: 2024-12-13 14:17:11.042 [WARNING][4370] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" HandleID="k8s-pod-network.d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" Workload="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--7rpbw-eth0" Dec 13 14:17:11.056044 env[1824]: 2024-12-13 14:17:11.042 [INFO][4370] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" HandleID="k8s-pod-network.d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" Workload="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--7rpbw-eth0" Dec 13 14:17:11.056044 env[1824]: 2024-12-13 14:17:11.046 [INFO][4370] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:11.056044 env[1824]: 2024-12-13 14:17:11.053 [INFO][4350] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" Dec 13 14:17:11.061788 systemd[1]: run-netns-cni\x2d90ff404b\x2d78e6\x2d7a50\x2db7ca\x2d3731ef0799e8.mount: Deactivated successfully. Dec 13 14:17:11.064608 env[1824]: time="2024-12-13T14:17:11.064545589Z" level=info msg="TearDown network for sandbox \"d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac\" successfully" Dec 13 14:17:11.065246 env[1824]: time="2024-12-13T14:17:11.065167984Z" level=info msg="StopPodSandbox for \"d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac\" returns successfully" Dec 13 14:17:11.066709 env[1824]: time="2024-12-13T14:17:11.066655905Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-7rpbw,Uid:eaf54e69-06a6-44c4-9afc-ea6802f54674,Namespace:kube-system,Attempt:1,}" Dec 13 14:17:11.122192 env[1824]: 2024-12-13 14:17:10.813 [INFO][4343] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" Dec 13 14:17:11.122192 env[1824]: 2024-12-13 14:17:10.813 [INFO][4343] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" iface="eth0" netns="/var/run/netns/cni-ef485198-3900-a4f5-8d68-ee49b5b34c15" Dec 13 14:17:11.122192 env[1824]: 2024-12-13 14:17:10.814 [INFO][4343] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" iface="eth0" netns="/var/run/netns/cni-ef485198-3900-a4f5-8d68-ee49b5b34c15" Dec 13 14:17:11.122192 env[1824]: 2024-12-13 14:17:10.814 [INFO][4343] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" iface="eth0" netns="/var/run/netns/cni-ef485198-3900-a4f5-8d68-ee49b5b34c15" Dec 13 14:17:11.122192 env[1824]: 2024-12-13 14:17:10.814 [INFO][4343] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" Dec 13 14:17:11.122192 env[1824]: 2024-12-13 14:17:10.814 [INFO][4343] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" Dec 13 14:17:11.122192 env[1824]: 2024-12-13 14:17:11.081 [INFO][4384] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" HandleID="k8s-pod-network.39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" Workload="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--l2sq4-eth0" Dec 13 14:17:11.122192 env[1824]: 2024-12-13 14:17:11.082 [INFO][4384] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:11.122192 env[1824]: 2024-12-13 14:17:11.082 [INFO][4384] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:11.122192 env[1824]: 2024-12-13 14:17:11.107 [WARNING][4384] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" HandleID="k8s-pod-network.39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" Workload="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--l2sq4-eth0" Dec 13 14:17:11.122192 env[1824]: 2024-12-13 14:17:11.108 [INFO][4384] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" HandleID="k8s-pod-network.39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" Workload="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--l2sq4-eth0" Dec 13 14:17:11.122192 env[1824]: 2024-12-13 14:17:11.112 [INFO][4384] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:11.122192 env[1824]: 2024-12-13 14:17:11.117 [INFO][4343] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" Dec 13 14:17:11.124827 env[1824]: time="2024-12-13T14:17:11.124759059Z" level=info msg="TearDown network for sandbox \"39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351\" successfully" Dec 13 14:17:11.125210 env[1824]: time="2024-12-13T14:17:11.125040244Z" level=info msg="StopPodSandbox for \"39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351\" returns successfully" Dec 13 14:17:11.134972 env[1824]: time="2024-12-13T14:17:11.134910891Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5fbcf8bc7f-l2sq4,Uid:c77b0a0c-a45a-4fdb-9438-06ec79198e34,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:17:11.263388 systemd-networkd[1536]: vxlan.calico: Gained IPv6LL Dec 13 14:17:11.592085 systemd-networkd[1536]: calie1d7807c7f8: Link UP Dec 13 14:17:11.594239 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:17:11.594869 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie1d7807c7f8: link becomes ready Dec 13 14:17:11.595403 systemd-networkd[1536]: calie1d7807c7f8: Gained carrier Dec 13 14:17:11.597002 (udev-worker)[4239]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:17:11.676208 env[1824]: 2024-12-13 14:17:11.234 [INFO][4405] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--24--217-k8s-coredns--7db6d8ff4d--xg6zq-eth0 coredns-7db6d8ff4d- kube-system beeed929-9ff9-469f-a97d-206e30099032 826 0 2024-12-13 14:16:32 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-24-217 coredns-7db6d8ff4d-xg6zq eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calie1d7807c7f8 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xg6zq" WorkloadEndpoint="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--xg6zq-" Dec 13 14:17:11.676208 env[1824]: 2024-12-13 14:17:11.235 [INFO][4405] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xg6zq" WorkloadEndpoint="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--xg6zq-eth0" Dec 13 14:17:11.676208 env[1824]: 2024-12-13 14:17:11.454 [INFO][4438] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a" HandleID="k8s-pod-network.cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a" Workload="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--xg6zq-eth0" Dec 13 14:17:11.676208 env[1824]: 2024-12-13 14:17:11.494 [INFO][4438] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a" HandleID="k8s-pod-network.cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a" Workload="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--xg6zq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000404f00), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-24-217", "pod":"coredns-7db6d8ff4d-xg6zq", "timestamp":"2024-12-13 14:17:11.446150741 +0000 UTC"}, Hostname:"ip-172-31-24-217", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:17:11.676208 env[1824]: 2024-12-13 14:17:11.494 [INFO][4438] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:11.676208 env[1824]: 2024-12-13 14:17:11.494 [INFO][4438] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:11.676208 env[1824]: 2024-12-13 14:17:11.494 [INFO][4438] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-24-217' Dec 13 14:17:11.676208 env[1824]: 2024-12-13 14:17:11.502 [INFO][4438] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a" host="ip-172-31-24-217" Dec 13 14:17:11.676208 env[1824]: 2024-12-13 14:17:11.529 [INFO][4438] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-24-217" Dec 13 14:17:11.676208 env[1824]: 2024-12-13 14:17:11.548 [INFO][4438] ipam/ipam.go 489: Trying affinity for 192.168.49.64/26 host="ip-172-31-24-217" Dec 13 14:17:11.676208 env[1824]: 2024-12-13 14:17:11.551 [INFO][4438] ipam/ipam.go 155: Attempting to load block cidr=192.168.49.64/26 host="ip-172-31-24-217" Dec 13 14:17:11.676208 env[1824]: 2024-12-13 14:17:11.556 [INFO][4438] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.49.64/26 host="ip-172-31-24-217" Dec 13 14:17:11.676208 env[1824]: 2024-12-13 14:17:11.556 [INFO][4438] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.49.64/26 handle="k8s-pod-network.cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a" host="ip-172-31-24-217" Dec 13 14:17:11.676208 env[1824]: 2024-12-13 14:17:11.559 [INFO][4438] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a Dec 13 14:17:11.676208 env[1824]: 2024-12-13 14:17:11.567 [INFO][4438] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.49.64/26 handle="k8s-pod-network.cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a" host="ip-172-31-24-217" Dec 13 14:17:11.676208 env[1824]: 2024-12-13 14:17:11.578 [INFO][4438] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.49.65/26] block=192.168.49.64/26 handle="k8s-pod-network.cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a" host="ip-172-31-24-217" Dec 13 14:17:11.676208 env[1824]: 2024-12-13 14:17:11.578 [INFO][4438] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.49.65/26] handle="k8s-pod-network.cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a" host="ip-172-31-24-217" Dec 13 14:17:11.676208 env[1824]: 2024-12-13 14:17:11.578 [INFO][4438] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:11.676208 env[1824]: 2024-12-13 14:17:11.578 [INFO][4438] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.49.65/26] IPv6=[] ContainerID="cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a" HandleID="k8s-pod-network.cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a" Workload="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--xg6zq-eth0" Dec 13 14:17:11.678977 env[1824]: 2024-12-13 14:17:11.583 [INFO][4405] cni-plugin/k8s.go 386: Populated endpoint ContainerID="cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xg6zq" WorkloadEndpoint="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--xg6zq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--24--217-k8s-coredns--7db6d8ff4d--xg6zq-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"beeed929-9ff9-469f-a97d-206e30099032", ResourceVersion:"826", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-24-217", ContainerID:"", Pod:"coredns-7db6d8ff4d-xg6zq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.49.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie1d7807c7f8", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:11.678977 env[1824]: 2024-12-13 14:17:11.584 [INFO][4405] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.49.65/32] ContainerID="cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xg6zq" WorkloadEndpoint="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--xg6zq-eth0" Dec 13 14:17:11.678977 env[1824]: 2024-12-13 14:17:11.584 [INFO][4405] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie1d7807c7f8 ContainerID="cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xg6zq" WorkloadEndpoint="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--xg6zq-eth0" Dec 13 14:17:11.678977 env[1824]: 2024-12-13 14:17:11.612 [INFO][4405] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xg6zq" WorkloadEndpoint="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--xg6zq-eth0" Dec 13 14:17:11.678977 env[1824]: 2024-12-13 14:17:11.621 [INFO][4405] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xg6zq" WorkloadEndpoint="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--xg6zq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--24--217-k8s-coredns--7db6d8ff4d--xg6zq-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"beeed929-9ff9-469f-a97d-206e30099032", ResourceVersion:"826", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-24-217", ContainerID:"cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a", Pod:"coredns-7db6d8ff4d-xg6zq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.49.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie1d7807c7f8", MAC:"f6:f9:52:bc:51:42", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:11.678977 env[1824]: 2024-12-13 14:17:11.671 [INFO][4405] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xg6zq" WorkloadEndpoint="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--xg6zq-eth0" Dec 13 14:17:11.708845 systemd-networkd[1536]: cali5fe6c36e5ca: Link UP Dec 13 14:17:11.715978 systemd-networkd[1536]: cali5fe6c36e5ca: Gained carrier Dec 13 14:17:11.718268 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5fe6c36e5ca: link becomes ready Dec 13 14:17:11.772848 env[1824]: 2024-12-13 14:17:11.342 [INFO][4417] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--24--217-k8s-coredns--7db6d8ff4d--7rpbw-eth0 coredns-7db6d8ff4d- kube-system eaf54e69-06a6-44c4-9afc-ea6802f54674 824 0 2024-12-13 14:16:32 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-24-217 coredns-7db6d8ff4d-7rpbw eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali5fe6c36e5ca [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7rpbw" WorkloadEndpoint="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--7rpbw-" Dec 13 14:17:11.772848 env[1824]: 2024-12-13 14:17:11.343 [INFO][4417] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7rpbw" WorkloadEndpoint="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--7rpbw-eth0" Dec 13 14:17:11.772848 env[1824]: 2024-12-13 14:17:11.467 [INFO][4444] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8" HandleID="k8s-pod-network.aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8" Workload="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--7rpbw-eth0" Dec 13 14:17:11.772848 env[1824]: 2024-12-13 14:17:11.520 [INFO][4444] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8" HandleID="k8s-pod-network.aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8" Workload="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--7rpbw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000431400), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-24-217", "pod":"coredns-7db6d8ff4d-7rpbw", "timestamp":"2024-12-13 14:17:11.467801127 +0000 UTC"}, Hostname:"ip-172-31-24-217", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:17:11.772848 env[1824]: 2024-12-13 14:17:11.522 [INFO][4444] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:11.772848 env[1824]: 2024-12-13 14:17:11.578 [INFO][4444] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:11.772848 env[1824]: 2024-12-13 14:17:11.579 [INFO][4444] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-24-217' Dec 13 14:17:11.772848 env[1824]: 2024-12-13 14:17:11.585 [INFO][4444] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8" host="ip-172-31-24-217" Dec 13 14:17:11.772848 env[1824]: 2024-12-13 14:17:11.606 [INFO][4444] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-24-217" Dec 13 14:17:11.772848 env[1824]: 2024-12-13 14:17:11.626 [INFO][4444] ipam/ipam.go 489: Trying affinity for 192.168.49.64/26 host="ip-172-31-24-217" Dec 13 14:17:11.772848 env[1824]: 2024-12-13 14:17:11.639 [INFO][4444] ipam/ipam.go 155: Attempting to load block cidr=192.168.49.64/26 host="ip-172-31-24-217" Dec 13 14:17:11.772848 env[1824]: 2024-12-13 14:17:11.644 [INFO][4444] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.49.64/26 host="ip-172-31-24-217" Dec 13 14:17:11.772848 env[1824]: 2024-12-13 14:17:11.644 [INFO][4444] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.49.64/26 handle="k8s-pod-network.aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8" host="ip-172-31-24-217" Dec 13 14:17:11.772848 env[1824]: 2024-12-13 14:17:11.651 [INFO][4444] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8 Dec 13 14:17:11.772848 env[1824]: 2024-12-13 14:17:11.678 [INFO][4444] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.49.64/26 handle="k8s-pod-network.aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8" host="ip-172-31-24-217" Dec 13 14:17:11.772848 env[1824]: 2024-12-13 14:17:11.692 [INFO][4444] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.49.66/26] block=192.168.49.64/26 handle="k8s-pod-network.aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8" host="ip-172-31-24-217" Dec 13 14:17:11.772848 env[1824]: 2024-12-13 14:17:11.692 [INFO][4444] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.49.66/26] handle="k8s-pod-network.aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8" host="ip-172-31-24-217" Dec 13 14:17:11.772848 env[1824]: 2024-12-13 14:17:11.692 [INFO][4444] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:11.772848 env[1824]: 2024-12-13 14:17:11.692 [INFO][4444] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.49.66/26] IPv6=[] ContainerID="aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8" HandleID="k8s-pod-network.aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8" Workload="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--7rpbw-eth0" Dec 13 14:17:11.774881 env[1824]: 2024-12-13 14:17:11.698 [INFO][4417] cni-plugin/k8s.go 386: Populated endpoint ContainerID="aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7rpbw" WorkloadEndpoint="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--7rpbw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--24--217-k8s-coredns--7db6d8ff4d--7rpbw-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"eaf54e69-06a6-44c4-9afc-ea6802f54674", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-24-217", ContainerID:"", Pod:"coredns-7db6d8ff4d-7rpbw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.49.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5fe6c36e5ca", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:11.774881 env[1824]: 2024-12-13 14:17:11.698 [INFO][4417] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.49.66/32] ContainerID="aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7rpbw" WorkloadEndpoint="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--7rpbw-eth0" Dec 13 14:17:11.774881 env[1824]: 2024-12-13 14:17:11.698 [INFO][4417] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5fe6c36e5ca ContainerID="aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7rpbw" WorkloadEndpoint="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--7rpbw-eth0" Dec 13 14:17:11.774881 env[1824]: 2024-12-13 14:17:11.719 [INFO][4417] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7rpbw" WorkloadEndpoint="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--7rpbw-eth0" Dec 13 14:17:11.774881 env[1824]: 2024-12-13 14:17:11.723 [INFO][4417] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7rpbw" WorkloadEndpoint="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--7rpbw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--24--217-k8s-coredns--7db6d8ff4d--7rpbw-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"eaf54e69-06a6-44c4-9afc-ea6802f54674", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-24-217", ContainerID:"aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8", Pod:"coredns-7db6d8ff4d-7rpbw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.49.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5fe6c36e5ca", MAC:"ca:d0:72:d9:ed:52", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:11.774881 env[1824]: 2024-12-13 14:17:11.769 [INFO][4417] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7rpbw" WorkloadEndpoint="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--7rpbw-eth0" Dec 13 14:17:11.811342 env[1824]: time="2024-12-13T14:17:11.805925140Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:17:11.811342 env[1824]: time="2024-12-13T14:17:11.806174535Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:17:11.811342 env[1824]: time="2024-12-13T14:17:11.806239470Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:17:11.811342 env[1824]: time="2024-12-13T14:17:11.806939905Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a pid=4488 runtime=io.containerd.runc.v2 Dec 13 14:17:11.841000 audit[4506]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=4506 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:11.851881 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2b659a48d0f: link becomes ready Dec 13 14:17:11.841000 audit[4506]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffd13e1d00 a2=0 a3=ffff8f913fa8 items=0 ppid=4092 pid=4506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:11.841000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:11.852947 systemd-networkd[1536]: cali2b659a48d0f: Link UP Dec 13 14:17:11.859510 systemd-networkd[1536]: cali2b659a48d0f: Gained carrier Dec 13 14:17:11.893865 env[1824]: time="2024-12-13T14:17:11.893643297Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:17:11.893865 env[1824]: time="2024-12-13T14:17:11.893770322Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:17:11.894353 env[1824]: time="2024-12-13T14:17:11.893866627Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:17:11.894719 env[1824]: time="2024-12-13T14:17:11.894590786Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8 pid=4521 runtime=io.containerd.runc.v2 Dec 13 14:17:11.924466 systemd[1]: run-netns-cni\x2def485198\x2d3900\x2da4f5\x2d8d68\x2dee49b5b34c15.mount: Deactivated successfully. Dec 13 14:17:11.945421 env[1824]: 2024-12-13 14:17:11.351 [INFO][4394] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--24--217-k8s-csi--node--driver--jcqpr-eth0 csi-node-driver- calico-system 7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c 825 0 2024-12-13 14:16:42 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ip-172-31-24-217 csi-node-driver-jcqpr eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali2b659a48d0f [] []}} ContainerID="cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9" Namespace="calico-system" Pod="csi-node-driver-jcqpr" WorkloadEndpoint="ip--172--31--24--217-k8s-csi--node--driver--jcqpr-" Dec 13 14:17:11.945421 env[1824]: 2024-12-13 14:17:11.351 [INFO][4394] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9" Namespace="calico-system" Pod="csi-node-driver-jcqpr" WorkloadEndpoint="ip--172--31--24--217-k8s-csi--node--driver--jcqpr-eth0" Dec 13 14:17:11.945421 env[1824]: 2024-12-13 14:17:11.512 [INFO][4445] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9" HandleID="k8s-pod-network.cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9" Workload="ip--172--31--24--217-k8s-csi--node--driver--jcqpr-eth0" Dec 13 14:17:11.945421 env[1824]: 2024-12-13 14:17:11.544 [INFO][4445] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9" HandleID="k8s-pod-network.cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9" Workload="ip--172--31--24--217-k8s-csi--node--driver--jcqpr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002baf60), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-24-217", "pod":"csi-node-driver-jcqpr", "timestamp":"2024-12-13 14:17:11.512267546 +0000 UTC"}, Hostname:"ip-172-31-24-217", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:17:11.945421 env[1824]: 2024-12-13 14:17:11.544 [INFO][4445] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:11.945421 env[1824]: 2024-12-13 14:17:11.692 [INFO][4445] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:11.945421 env[1824]: 2024-12-13 14:17:11.692 [INFO][4445] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-24-217' Dec 13 14:17:11.945421 env[1824]: 2024-12-13 14:17:11.703 [INFO][4445] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9" host="ip-172-31-24-217" Dec 13 14:17:11.945421 env[1824]: 2024-12-13 14:17:11.733 [INFO][4445] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-24-217" Dec 13 14:17:11.945421 env[1824]: 2024-12-13 14:17:11.750 [INFO][4445] ipam/ipam.go 489: Trying affinity for 192.168.49.64/26 host="ip-172-31-24-217" Dec 13 14:17:11.945421 env[1824]: 2024-12-13 14:17:11.755 [INFO][4445] ipam/ipam.go 155: Attempting to load block cidr=192.168.49.64/26 host="ip-172-31-24-217" Dec 13 14:17:11.945421 env[1824]: 2024-12-13 14:17:11.779 [INFO][4445] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.49.64/26 host="ip-172-31-24-217" Dec 13 14:17:11.945421 env[1824]: 2024-12-13 14:17:11.779 [INFO][4445] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.49.64/26 handle="k8s-pod-network.cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9" host="ip-172-31-24-217" Dec 13 14:17:11.945421 env[1824]: 2024-12-13 14:17:11.787 [INFO][4445] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9 Dec 13 14:17:11.945421 env[1824]: 2024-12-13 14:17:11.797 [INFO][4445] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.49.64/26 handle="k8s-pod-network.cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9" host="ip-172-31-24-217" Dec 13 14:17:11.945421 env[1824]: 2024-12-13 14:17:11.811 [INFO][4445] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.49.67/26] block=192.168.49.64/26 handle="k8s-pod-network.cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9" host="ip-172-31-24-217" Dec 13 14:17:11.945421 env[1824]: 2024-12-13 14:17:11.811 [INFO][4445] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.49.67/26] handle="k8s-pod-network.cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9" host="ip-172-31-24-217" Dec 13 14:17:11.945421 env[1824]: 2024-12-13 14:17:11.811 [INFO][4445] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:11.945421 env[1824]: 2024-12-13 14:17:11.811 [INFO][4445] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.49.67/26] IPv6=[] ContainerID="cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9" HandleID="k8s-pod-network.cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9" Workload="ip--172--31--24--217-k8s-csi--node--driver--jcqpr-eth0" Dec 13 14:17:11.947258 env[1824]: 2024-12-13 14:17:11.822 [INFO][4394] cni-plugin/k8s.go 386: Populated endpoint ContainerID="cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9" Namespace="calico-system" Pod="csi-node-driver-jcqpr" WorkloadEndpoint="ip--172--31--24--217-k8s-csi--node--driver--jcqpr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--24--217-k8s-csi--node--driver--jcqpr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c", ResourceVersion:"825", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-24-217", ContainerID:"", Pod:"csi-node-driver-jcqpr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.49.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2b659a48d0f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:11.947258 env[1824]: 2024-12-13 14:17:11.823 [INFO][4394] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.49.67/32] ContainerID="cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9" Namespace="calico-system" Pod="csi-node-driver-jcqpr" WorkloadEndpoint="ip--172--31--24--217-k8s-csi--node--driver--jcqpr-eth0" Dec 13 14:17:11.947258 env[1824]: 2024-12-13 14:17:11.823 [INFO][4394] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2b659a48d0f ContainerID="cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9" Namespace="calico-system" Pod="csi-node-driver-jcqpr" WorkloadEndpoint="ip--172--31--24--217-k8s-csi--node--driver--jcqpr-eth0" Dec 13 14:17:11.947258 env[1824]: 2024-12-13 14:17:11.873 [INFO][4394] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9" Namespace="calico-system" Pod="csi-node-driver-jcqpr" WorkloadEndpoint="ip--172--31--24--217-k8s-csi--node--driver--jcqpr-eth0" Dec 13 14:17:11.947258 env[1824]: 2024-12-13 14:17:11.874 [INFO][4394] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9" Namespace="calico-system" Pod="csi-node-driver-jcqpr" WorkloadEndpoint="ip--172--31--24--217-k8s-csi--node--driver--jcqpr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--24--217-k8s-csi--node--driver--jcqpr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c", ResourceVersion:"825", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-24-217", ContainerID:"cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9", Pod:"csi-node-driver-jcqpr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.49.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2b659a48d0f", MAC:"86:41:a8:25:56:98", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:11.947258 env[1824]: 2024-12-13 14:17:11.930 [INFO][4394] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9" Namespace="calico-system" Pod="csi-node-driver-jcqpr" WorkloadEndpoint="ip--172--31--24--217-k8s-csi--node--driver--jcqpr-eth0" Dec 13 14:17:11.964063 systemd[1]: Started cri-containerd-cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a.scope. Dec 13 14:17:11.987683 systemd[1]: run-containerd-runc-k8s.io-cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a-runc.SqolyI.mount: Deactivated successfully. Dec 13 14:17:12.010857 systemd[1]: Started cri-containerd-aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8.scope. Dec 13 14:17:12.037371 systemd[1]: run-containerd-runc-k8s.io-aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8-runc.AsRI7d.mount: Deactivated successfully. Dec 13 14:17:12.070511 env[1824]: time="2024-12-13T14:17:12.069714224Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:17:12.070511 env[1824]: time="2024-12-13T14:17:12.069840169Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:17:12.070511 env[1824]: time="2024-12-13T14:17:12.069872247Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:17:12.070511 env[1824]: time="2024-12-13T14:17:12.070232814Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9 pid=4563 runtime=io.containerd.runc.v2 Dec 13 14:17:12.091447 systemd-networkd[1536]: calia421194004a: Link UP Dec 13 14:17:12.096292 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia421194004a: link becomes ready Dec 13 14:17:12.095992 systemd-networkd[1536]: calia421194004a: Gained carrier Dec 13 14:17:12.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.110000 audit: BPF prog-id=164 op=LOAD Dec 13 14:17:12.114000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.114000 audit[4503]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4488 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363653139356663356635623239366535623163643362366530326231 Dec 13 14:17:12.114000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.114000 audit[4503]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4488 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363653139356663356635623239366535623163643362366530326231 Dec 13 14:17:12.126000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.126000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.126000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.126000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.126000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.126000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.126000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.126000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.126000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.126000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.126000 audit: BPF prog-id=165 op=LOAD Dec 13 14:17:12.126000 audit[4503]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4488 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363653139356663356635623239366535623163643362366530326231 Dec 13 14:17:12.127000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.127000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.127000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.127000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.127000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.127000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.127000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.127000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.127000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.127000 audit: BPF prog-id=166 op=LOAD Dec 13 14:17:12.127000 audit[4503]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4488 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363653139356663356635623239366535623163643362366530326231 Dec 13 14:17:12.131000 audit: BPF prog-id=166 op=UNLOAD Dec 13 14:17:12.131000 audit: BPF prog-id=165 op=UNLOAD Dec 13 14:17:12.131000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.131000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.131000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.131000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.131000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.131000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.131000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.131000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.131000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.131000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.131000 audit: BPF prog-id=167 op=LOAD Dec 13 14:17:12.131000 audit[4503]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4488 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363653139356663356635623239366535623163643362366530326231 Dec 13 14:17:12.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.152000 audit: BPF prog-id=168 op=LOAD Dec 13 14:17:12.152000 audit[4566]: NETFILTER_CFG table=filter:102 family=2 entries=30 op=nft_register_chain pid=4566 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:12.152000 audit[4566]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=17032 a0=3 a1=ffffd9e25e80 a2=0 a3=ffffaf973fa8 items=0 ppid=4092 pid=4566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.152000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:12.155000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.155000 audit[4534]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4521 pid=4534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161643037323639353266666166336538303266663430333366383633 Dec 13 14:17:12.155000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.155000 audit[4534]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4521 pid=4534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161643037323639353266666166336538303266663430333366383633 Dec 13 14:17:12.155000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.155000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.155000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.155000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.155000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.155000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.155000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.155000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.155000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.155000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.155000 audit: BPF prog-id=169 op=LOAD Dec 13 14:17:12.155000 audit[4534]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4521 pid=4534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161643037323639353266666166336538303266663430333366383633 Dec 13 14:17:12.156000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.156000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.156000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.156000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.156000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.156000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.156000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.156000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.156000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.156000 audit: BPF prog-id=170 op=LOAD Dec 13 14:17:12.156000 audit[4534]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4521 pid=4534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161643037323639353266666166336538303266663430333366383633 Dec 13 14:17:12.156000 audit: BPF prog-id=170 op=UNLOAD Dec 13 14:17:12.156000 audit: BPF prog-id=169 op=UNLOAD Dec 13 14:17:12.156000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.156000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.156000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.156000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.156000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.156000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.156000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.156000 audit[4534]: AVC avc: denied { perfmon } for pid=4534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.156000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.156000 audit[4534]: AVC avc: denied { bpf } for pid=4534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.156000 audit: BPF prog-id=171 op=LOAD Dec 13 14:17:12.156000 audit[4534]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4521 pid=4534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161643037323639353266666166336538303266663430333366383633 Dec 13 14:17:12.163456 env[1824]: 2024-12-13 14:17:11.515 [INFO][4428] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--l2sq4-eth0 calico-apiserver-5fbcf8bc7f- calico-apiserver c77b0a0c-a45a-4fdb-9438-06ec79198e34 827 0 2024-12-13 14:16:42 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5fbcf8bc7f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-24-217 calico-apiserver-5fbcf8bc7f-l2sq4 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calia421194004a [] []}} ContainerID="3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185" Namespace="calico-apiserver" Pod="calico-apiserver-5fbcf8bc7f-l2sq4" WorkloadEndpoint="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--l2sq4-" Dec 13 14:17:12.163456 env[1824]: 2024-12-13 14:17:11.515 [INFO][4428] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185" Namespace="calico-apiserver" Pod="calico-apiserver-5fbcf8bc7f-l2sq4" WorkloadEndpoint="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--l2sq4-eth0" Dec 13 14:17:12.163456 env[1824]: 2024-12-13 14:17:11.661 [INFO][4460] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185" HandleID="k8s-pod-network.3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185" Workload="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--l2sq4-eth0" Dec 13 14:17:12.163456 env[1824]: 2024-12-13 14:17:11.696 [INFO][4460] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185" HandleID="k8s-pod-network.3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185" Workload="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--l2sq4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002a0bb0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-24-217", "pod":"calico-apiserver-5fbcf8bc7f-l2sq4", "timestamp":"2024-12-13 14:17:11.661186697 +0000 UTC"}, Hostname:"ip-172-31-24-217", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:17:12.163456 env[1824]: 2024-12-13 14:17:11.696 [INFO][4460] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:12.163456 env[1824]: 2024-12-13 14:17:11.813 [INFO][4460] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:12.163456 env[1824]: 2024-12-13 14:17:11.813 [INFO][4460] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-24-217' Dec 13 14:17:12.163456 env[1824]: 2024-12-13 14:17:11.838 [INFO][4460] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185" host="ip-172-31-24-217" Dec 13 14:17:12.163456 env[1824]: 2024-12-13 14:17:11.900 [INFO][4460] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-24-217" Dec 13 14:17:12.163456 env[1824]: 2024-12-13 14:17:11.959 [INFO][4460] ipam/ipam.go 489: Trying affinity for 192.168.49.64/26 host="ip-172-31-24-217" Dec 13 14:17:12.163456 env[1824]: 2024-12-13 14:17:11.968 [INFO][4460] ipam/ipam.go 155: Attempting to load block cidr=192.168.49.64/26 host="ip-172-31-24-217" Dec 13 14:17:12.163456 env[1824]: 2024-12-13 14:17:11.995 [INFO][4460] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.49.64/26 host="ip-172-31-24-217" Dec 13 14:17:12.163456 env[1824]: 2024-12-13 14:17:11.995 [INFO][4460] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.49.64/26 handle="k8s-pod-network.3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185" host="ip-172-31-24-217" Dec 13 14:17:12.163456 env[1824]: 2024-12-13 14:17:12.005 [INFO][4460] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185 Dec 13 14:17:12.163456 env[1824]: 2024-12-13 14:17:12.036 [INFO][4460] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.49.64/26 handle="k8s-pod-network.3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185" host="ip-172-31-24-217" Dec 13 14:17:12.163456 env[1824]: 2024-12-13 14:17:12.065 [INFO][4460] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.49.68/26] block=192.168.49.64/26 handle="k8s-pod-network.3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185" host="ip-172-31-24-217" Dec 13 14:17:12.163456 env[1824]: 2024-12-13 14:17:12.065 [INFO][4460] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.49.68/26] handle="k8s-pod-network.3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185" host="ip-172-31-24-217" Dec 13 14:17:12.163456 env[1824]: 2024-12-13 14:17:12.065 [INFO][4460] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:12.163456 env[1824]: 2024-12-13 14:17:12.065 [INFO][4460] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.49.68/26] IPv6=[] ContainerID="3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185" HandleID="k8s-pod-network.3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185" Workload="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--l2sq4-eth0" Dec 13 14:17:12.164774 env[1824]: 2024-12-13 14:17:12.079 [INFO][4428] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185" Namespace="calico-apiserver" Pod="calico-apiserver-5fbcf8bc7f-l2sq4" WorkloadEndpoint="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--l2sq4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--l2sq4-eth0", GenerateName:"calico-apiserver-5fbcf8bc7f-", Namespace:"calico-apiserver", SelfLink:"", UID:"c77b0a0c-a45a-4fdb-9438-06ec79198e34", ResourceVersion:"827", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5fbcf8bc7f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-24-217", ContainerID:"", Pod:"calico-apiserver-5fbcf8bc7f-l2sq4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.49.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia421194004a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:12.164774 env[1824]: 2024-12-13 14:17:12.079 [INFO][4428] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.49.68/32] ContainerID="3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185" Namespace="calico-apiserver" Pod="calico-apiserver-5fbcf8bc7f-l2sq4" WorkloadEndpoint="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--l2sq4-eth0" Dec 13 14:17:12.164774 env[1824]: 2024-12-13 14:17:12.080 [INFO][4428] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia421194004a ContainerID="3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185" Namespace="calico-apiserver" Pod="calico-apiserver-5fbcf8bc7f-l2sq4" WorkloadEndpoint="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--l2sq4-eth0" Dec 13 14:17:12.164774 env[1824]: 2024-12-13 14:17:12.097 [INFO][4428] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185" Namespace="calico-apiserver" Pod="calico-apiserver-5fbcf8bc7f-l2sq4" WorkloadEndpoint="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--l2sq4-eth0" Dec 13 14:17:12.164774 env[1824]: 2024-12-13 14:17:12.115 [INFO][4428] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185" Namespace="calico-apiserver" Pod="calico-apiserver-5fbcf8bc7f-l2sq4" WorkloadEndpoint="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--l2sq4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--l2sq4-eth0", GenerateName:"calico-apiserver-5fbcf8bc7f-", Namespace:"calico-apiserver", SelfLink:"", UID:"c77b0a0c-a45a-4fdb-9438-06ec79198e34", ResourceVersion:"827", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5fbcf8bc7f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-24-217", ContainerID:"3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185", Pod:"calico-apiserver-5fbcf8bc7f-l2sq4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.49.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia421194004a", MAC:"2a:4b:69:43:18:56", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:12.164774 env[1824]: 2024-12-13 14:17:12.155 [INFO][4428] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185" Namespace="calico-apiserver" Pod="calico-apiserver-5fbcf8bc7f-l2sq4" WorkloadEndpoint="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--l2sq4-eth0" Dec 13 14:17:12.164917 systemd[1]: Started cri-containerd-cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9.scope. Dec 13 14:17:12.227613 env[1824]: time="2024-12-13T14:17:12.227547920Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-7rpbw,Uid:eaf54e69-06a6-44c4-9afc-ea6802f54674,Namespace:kube-system,Attempt:1,} returns sandbox id \"aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8\"" Dec 13 14:17:12.246071 env[1824]: time="2024-12-13T14:17:12.245979143Z" level=info msg="CreateContainer within sandbox \"aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:17:12.253532 env[1824]: time="2024-12-13T14:17:12.253404531Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:17:12.269179 env[1824]: time="2024-12-13T14:17:12.253884767Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:17:12.269179 env[1824]: time="2024-12-13T14:17:12.253977819Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:17:12.269179 env[1824]: time="2024-12-13T14:17:12.254601054Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185 pid=4622 runtime=io.containerd.runc.v2 Dec 13 14:17:12.326616 env[1824]: time="2024-12-13T14:17:12.326380700Z" level=info msg="CreateContainer within sandbox \"aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"1ba43600ceeb26c705f91328c533335448fb9d2c32f882d526ea133ead745123\"" Dec 13 14:17:12.341398 env[1824]: time="2024-12-13T14:17:12.341303298Z" level=info msg="StartContainer for \"1ba43600ceeb26c705f91328c533335448fb9d2c32f882d526ea133ead745123\"" Dec 13 14:17:12.342953 env[1824]: time="2024-12-13T14:17:12.342082636Z" level=info msg="StopPodSandbox for \"8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187\"" Dec 13 14:17:12.354644 env[1824]: time="2024-12-13T14:17:12.354566514Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-xg6zq,Uid:beeed929-9ff9-469f-a97d-206e30099032,Namespace:kube-system,Attempt:1,} returns sandbox id \"cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a\"" Dec 13 14:17:12.370746 env[1824]: time="2024-12-13T14:17:12.370578531Z" level=info msg="CreateContainer within sandbox \"cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:17:12.403371 systemd[1]: Started cri-containerd-3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185.scope. Dec 13 14:17:12.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.412000 audit: BPF prog-id=172 op=LOAD Dec 13 14:17:12.414000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.414000 audit[4579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4563 pid=4579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362646566363365616233363833326664666130316366383063306663 Dec 13 14:17:12.414000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.414000 audit[4579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4563 pid=4579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362646566363365616233363833326664666130316366383063306663 Dec 13 14:17:12.415000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.415000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.415000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.415000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.415000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.415000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.415000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.415000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.415000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.415000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.415000 audit: BPF prog-id=173 op=LOAD Dec 13 14:17:12.415000 audit[4579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4563 pid=4579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362646566363365616233363833326664666130316366383063306663 Dec 13 14:17:12.415000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.415000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.415000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.415000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.415000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.415000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.415000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.415000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.415000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.415000 audit: BPF prog-id=174 op=LOAD Dec 13 14:17:12.415000 audit[4579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4563 pid=4579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362646566363365616233363833326664666130316366383063306663 Dec 13 14:17:12.417000 audit: BPF prog-id=174 op=UNLOAD Dec 13 14:17:12.417000 audit: BPF prog-id=173 op=UNLOAD Dec 13 14:17:12.417000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.417000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.417000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.417000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.417000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.417000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.417000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.417000 audit[4579]: AVC avc: denied { perfmon } for pid=4579 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.417000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.417000 audit[4579]: AVC avc: denied { bpf } for pid=4579 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.417000 audit: BPF prog-id=175 op=LOAD Dec 13 14:17:12.417000 audit[4579]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4563 pid=4579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362646566363365616233363833326664666130316366383063306663 Dec 13 14:17:12.425000 audit[4667]: NETFILTER_CFG table=filter:103 family=2 entries=78 op=nft_register_chain pid=4667 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:12.425000 audit[4667]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=43304 a0=3 a1=ffffc21a1e10 a2=0 a3=ffff85b22fa8 items=0 ppid=4092 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.425000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:12.481634 systemd[1]: Started cri-containerd-1ba43600ceeb26c705f91328c533335448fb9d2c32f882d526ea133ead745123.scope. Dec 13 14:17:12.493768 env[1824]: time="2024-12-13T14:17:12.493678598Z" level=info msg="CreateContainer within sandbox \"cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"f5b3ec36fdd052d57b731d243c2648792c8fd15b232f6672bd8f70a3269d00c0\"" Dec 13 14:17:12.496172 env[1824]: time="2024-12-13T14:17:12.494163743Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jcqpr,Uid:7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c,Namespace:calico-system,Attempt:1,} returns sandbox id \"cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9\"" Dec 13 14:17:12.500204 env[1824]: time="2024-12-13T14:17:12.498727693Z" level=info msg="StartContainer for \"f5b3ec36fdd052d57b731d243c2648792c8fd15b232f6672bd8f70a3269d00c0\"" Dec 13 14:17:12.515573 env[1824]: time="2024-12-13T14:17:12.515492970Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:17:12.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.545000 audit: BPF prog-id=176 op=LOAD Dec 13 14:17:12.551000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.551000 audit[4646]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=4622 pid=4646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364366333386634623961363138633537373163663936303839386432 Dec 13 14:17:12.554000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.554000 audit[4646]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=4622 pid=4646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364366333386634623961363138633537373163663936303839386432 Dec 13 14:17:12.554000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.554000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.554000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.554000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.554000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.554000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.554000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.554000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.554000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.554000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.554000 audit: BPF prog-id=177 op=LOAD Dec 13 14:17:12.554000 audit[4646]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=4622 pid=4646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364366333386634623961363138633537373163663936303839386432 Dec 13 14:17:12.554000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.554000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.554000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.554000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.554000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.554000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.554000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.554000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.554000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.554000 audit: BPF prog-id=178 op=LOAD Dec 13 14:17:12.554000 audit[4646]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=4622 pid=4646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364366333386634623961363138633537373163663936303839386432 Dec 13 14:17:12.555000 audit: BPF prog-id=178 op=UNLOAD Dec 13 14:17:12.555000 audit: BPF prog-id=177 op=UNLOAD Dec 13 14:17:12.555000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.555000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.555000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.555000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.555000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.555000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.555000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.555000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.555000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.555000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.555000 audit: BPF prog-id=179 op=LOAD Dec 13 14:17:12.555000 audit[4646]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=4622 pid=4646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364366333386634623961363138633537373163663936303839386432 Dec 13 14:17:12.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.577000 audit: BPF prog-id=180 op=LOAD Dec 13 14:17:12.579000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.579000 audit[4684]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4521 pid=4684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162613433363030636565623236633730356639313332386335333333 Dec 13 14:17:12.579000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.579000 audit[4684]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4521 pid=4684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162613433363030636565623236633730356639313332386335333333 Dec 13 14:17:12.581000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.581000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.581000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.581000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.581000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.581000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.581000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.581000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.581000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.581000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.581000 audit: BPF prog-id=181 op=LOAD Dec 13 14:17:12.581000 audit[4684]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4521 pid=4684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162613433363030636565623236633730356639313332386335333333 Dec 13 14:17:12.585000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.585000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.585000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.585000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.585000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.585000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.585000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.585000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.585000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.585000 audit: BPF prog-id=182 op=LOAD Dec 13 14:17:12.585000 audit[4684]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4521 pid=4684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162613433363030636565623236633730356639313332386335333333 Dec 13 14:17:12.587000 audit: BPF prog-id=182 op=UNLOAD Dec 13 14:17:12.588000 audit: BPF prog-id=181 op=UNLOAD Dec 13 14:17:12.590000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.590000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.590000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.590000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.590000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.590000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.590000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.590000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.590000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.590000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.590000 audit: BPF prog-id=183 op=LOAD Dec 13 14:17:12.590000 audit[4684]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4521 pid=4684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162613433363030636565623236633730356639313332386335333333 Dec 13 14:17:12.623557 systemd[1]: Started cri-containerd-f5b3ec36fdd052d57b731d243c2648792c8fd15b232f6672bd8f70a3269d00c0.scope. Dec 13 14:17:12.702037 env[1824]: time="2024-12-13T14:17:12.701967239Z" level=info msg="StartContainer for \"1ba43600ceeb26c705f91328c533335448fb9d2c32f882d526ea133ead745123\" returns successfully" Dec 13 14:17:12.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.712000 audit: BPF prog-id=184 op=LOAD Dec 13 14:17:12.714000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.714000 audit[4733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4488 pid=4733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635623365633336666464303532643537623733316432343363323634 Dec 13 14:17:12.714000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.714000 audit[4733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4488 pid=4733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635623365633336666464303532643537623733316432343363323634 Dec 13 14:17:12.714000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.714000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.714000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.714000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.714000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.714000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.714000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.714000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.714000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.714000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.714000 audit: BPF prog-id=185 op=LOAD Dec 13 14:17:12.714000 audit[4733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4488 pid=4733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635623365633336666464303532643537623733316432343363323634 Dec 13 14:17:12.714000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.714000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.714000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.714000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.714000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.714000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.714000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.714000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.714000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.714000 audit: BPF prog-id=186 op=LOAD Dec 13 14:17:12.714000 audit[4733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4488 pid=4733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635623365633336666464303532643537623733316432343363323634 Dec 13 14:17:12.715000 audit: BPF prog-id=186 op=UNLOAD Dec 13 14:17:12.715000 audit: BPF prog-id=185 op=UNLOAD Dec 13 14:17:12.715000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.715000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.715000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.715000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.715000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.715000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.715000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.715000 audit[4733]: AVC avc: denied { perfmon } for pid=4733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.715000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.715000 audit[4733]: AVC avc: denied { bpf } for pid=4733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:12.715000 audit: BPF prog-id=187 op=LOAD Dec 13 14:17:12.715000 audit[4733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4488 pid=4733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635623365633336666464303532643537623733316432343363323634 Dec 13 14:17:12.808496 env[1824]: time="2024-12-13T14:17:12.808391458Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5fbcf8bc7f-l2sq4,Uid:c77b0a0c-a45a-4fdb-9438-06ec79198e34,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185\"" Dec 13 14:17:12.819071 env[1824]: time="2024-12-13T14:17:12.818929934Z" level=info msg="StartContainer for \"f5b3ec36fdd052d57b731d243c2648792c8fd15b232f6672bd8f70a3269d00c0\" returns successfully" Dec 13 14:17:12.892318 kubelet[2897]: I1213 14:17:12.888409 2897 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-7rpbw" podStartSLOduration=40.888370285 podStartE2EDuration="40.888370285s" podCreationTimestamp="2024-12-13 14:16:32 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:17:12.888034511 +0000 UTC m=+53.867638078" watchObservedRunningTime="2024-12-13 14:17:12.888370285 +0000 UTC m=+53.867973624" Dec 13 14:17:13.013851 env[1824]: 2024-12-13 14:17:12.853 [INFO][4710] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" Dec 13 14:17:13.013851 env[1824]: 2024-12-13 14:17:12.854 [INFO][4710] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" iface="eth0" netns="/var/run/netns/cni-2f9066d2-109e-1d79-81ae-a96cbae2a1c1" Dec 13 14:17:13.013851 env[1824]: 2024-12-13 14:17:12.854 [INFO][4710] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" iface="eth0" netns="/var/run/netns/cni-2f9066d2-109e-1d79-81ae-a96cbae2a1c1" Dec 13 14:17:13.013851 env[1824]: 2024-12-13 14:17:12.856 [INFO][4710] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" iface="eth0" netns="/var/run/netns/cni-2f9066d2-109e-1d79-81ae-a96cbae2a1c1" Dec 13 14:17:13.013851 env[1824]: 2024-12-13 14:17:12.856 [INFO][4710] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" Dec 13 14:17:13.013851 env[1824]: 2024-12-13 14:17:12.856 [INFO][4710] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" Dec 13 14:17:13.013851 env[1824]: 2024-12-13 14:17:12.972 [INFO][4778] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" HandleID="k8s-pod-network.8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" Workload="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--mnfv8-eth0" Dec 13 14:17:13.013851 env[1824]: 2024-12-13 14:17:12.973 [INFO][4778] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:13.013851 env[1824]: 2024-12-13 14:17:12.973 [INFO][4778] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:13.013851 env[1824]: 2024-12-13 14:17:13.000 [WARNING][4778] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" HandleID="k8s-pod-network.8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" Workload="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--mnfv8-eth0" Dec 13 14:17:13.013851 env[1824]: 2024-12-13 14:17:13.000 [INFO][4778] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" HandleID="k8s-pod-network.8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" Workload="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--mnfv8-eth0" Dec 13 14:17:13.013851 env[1824]: 2024-12-13 14:17:13.007 [INFO][4778] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:13.013851 env[1824]: 2024-12-13 14:17:13.010 [INFO][4710] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" Dec 13 14:17:13.019508 systemd[1]: run-netns-cni\x2d2f9066d2\x2d109e\x2d1d79\x2d81ae\x2da96cbae2a1c1.mount: Deactivated successfully. Dec 13 14:17:13.024223 env[1824]: time="2024-12-13T14:17:13.023983318Z" level=info msg="TearDown network for sandbox \"8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187\" successfully" Dec 13 14:17:13.024223 env[1824]: time="2024-12-13T14:17:13.024206683Z" level=info msg="StopPodSandbox for \"8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187\" returns successfully" Dec 13 14:17:13.025651 env[1824]: time="2024-12-13T14:17:13.025582720Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5fbcf8bc7f-mnfv8,Uid:f5a3f4a9-fdfd-48cb-a792-bf6570e63fbf,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:17:13.098000 audit[4796]: NETFILTER_CFG table=filter:104 family=2 entries=16 op=nft_register_rule pid=4796 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:13.098000 audit[4796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffc5849a00 a2=0 a3=1 items=0 ppid=3062 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.098000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:13.108000 audit[4796]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=4796 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:13.112002 systemd-networkd[1536]: calie1d7807c7f8: Gained IPv6LL Dec 13 14:17:13.108000 audit[4796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffc5849a00 a2=0 a3=1 items=0 ppid=3062 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.108000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:13.327148 env[1824]: time="2024-12-13T14:17:13.326568233Z" level=info msg="StopPodSandbox for \"e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223\"" Dec 13 14:17:13.367892 systemd-networkd[1536]: cali5fe6c36e5ca: Gained IPv6LL Dec 13 14:17:13.432819 systemd-networkd[1536]: cali2b659a48d0f: Gained IPv6LL Dec 13 14:17:13.493415 systemd-networkd[1536]: cali84fc5a9b2e7: Link UP Dec 13 14:17:13.500635 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:17:13.500803 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali84fc5a9b2e7: link becomes ready Dec 13 14:17:13.501061 systemd-networkd[1536]: cali84fc5a9b2e7: Gained carrier Dec 13 14:17:13.542084 env[1824]: 2024-12-13 14:17:13.164 [INFO][4787] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--mnfv8-eth0 calico-apiserver-5fbcf8bc7f- calico-apiserver f5a3f4a9-fdfd-48cb-a792-bf6570e63fbf 859 0 2024-12-13 14:16:42 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5fbcf8bc7f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-24-217 calico-apiserver-5fbcf8bc7f-mnfv8 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali84fc5a9b2e7 [] []}} ContainerID="67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1" Namespace="calico-apiserver" Pod="calico-apiserver-5fbcf8bc7f-mnfv8" WorkloadEndpoint="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--mnfv8-" Dec 13 14:17:13.542084 env[1824]: 2024-12-13 14:17:13.164 [INFO][4787] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1" Namespace="calico-apiserver" Pod="calico-apiserver-5fbcf8bc7f-mnfv8" WorkloadEndpoint="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--mnfv8-eth0" Dec 13 14:17:13.542084 env[1824]: 2024-12-13 14:17:13.286 [INFO][4802] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1" HandleID="k8s-pod-network.67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1" Workload="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--mnfv8-eth0" Dec 13 14:17:13.542084 env[1824]: 2024-12-13 14:17:13.314 [INFO][4802] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1" HandleID="k8s-pod-network.67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1" Workload="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--mnfv8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004cdc0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-24-217", "pod":"calico-apiserver-5fbcf8bc7f-mnfv8", "timestamp":"2024-12-13 14:17:13.286798769 +0000 UTC"}, Hostname:"ip-172-31-24-217", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:17:13.542084 env[1824]: 2024-12-13 14:17:13.314 [INFO][4802] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:13.542084 env[1824]: 2024-12-13 14:17:13.314 [INFO][4802] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:13.542084 env[1824]: 2024-12-13 14:17:13.314 [INFO][4802] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-24-217' Dec 13 14:17:13.542084 env[1824]: 2024-12-13 14:17:13.317 [INFO][4802] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1" host="ip-172-31-24-217" Dec 13 14:17:13.542084 env[1824]: 2024-12-13 14:17:13.339 [INFO][4802] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-24-217" Dec 13 14:17:13.542084 env[1824]: 2024-12-13 14:17:13.375 [INFO][4802] ipam/ipam.go 489: Trying affinity for 192.168.49.64/26 host="ip-172-31-24-217" Dec 13 14:17:13.542084 env[1824]: 2024-12-13 14:17:13.379 [INFO][4802] ipam/ipam.go 155: Attempting to load block cidr=192.168.49.64/26 host="ip-172-31-24-217" Dec 13 14:17:13.542084 env[1824]: 2024-12-13 14:17:13.384 [INFO][4802] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.49.64/26 host="ip-172-31-24-217" Dec 13 14:17:13.542084 env[1824]: 2024-12-13 14:17:13.385 [INFO][4802] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.49.64/26 handle="k8s-pod-network.67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1" host="ip-172-31-24-217" Dec 13 14:17:13.542084 env[1824]: 2024-12-13 14:17:13.389 [INFO][4802] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1 Dec 13 14:17:13.542084 env[1824]: 2024-12-13 14:17:13.418 [INFO][4802] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.49.64/26 handle="k8s-pod-network.67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1" host="ip-172-31-24-217" Dec 13 14:17:13.542084 env[1824]: 2024-12-13 14:17:13.461 [INFO][4802] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.49.69/26] block=192.168.49.64/26 handle="k8s-pod-network.67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1" host="ip-172-31-24-217" Dec 13 14:17:13.542084 env[1824]: 2024-12-13 14:17:13.462 [INFO][4802] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.49.69/26] handle="k8s-pod-network.67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1" host="ip-172-31-24-217" Dec 13 14:17:13.542084 env[1824]: 2024-12-13 14:17:13.462 [INFO][4802] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:13.542084 env[1824]: 2024-12-13 14:17:13.462 [INFO][4802] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.49.69/26] IPv6=[] ContainerID="67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1" HandleID="k8s-pod-network.67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1" Workload="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--mnfv8-eth0" Dec 13 14:17:13.543457 env[1824]: 2024-12-13 14:17:13.465 [INFO][4787] cni-plugin/k8s.go 386: Populated endpoint ContainerID="67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1" Namespace="calico-apiserver" Pod="calico-apiserver-5fbcf8bc7f-mnfv8" WorkloadEndpoint="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--mnfv8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--mnfv8-eth0", GenerateName:"calico-apiserver-5fbcf8bc7f-", Namespace:"calico-apiserver", SelfLink:"", UID:"f5a3f4a9-fdfd-48cb-a792-bf6570e63fbf", ResourceVersion:"859", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5fbcf8bc7f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-24-217", ContainerID:"", Pod:"calico-apiserver-5fbcf8bc7f-mnfv8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.49.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali84fc5a9b2e7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:13.543457 env[1824]: 2024-12-13 14:17:13.465 [INFO][4787] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.49.69/32] ContainerID="67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1" Namespace="calico-apiserver" Pod="calico-apiserver-5fbcf8bc7f-mnfv8" WorkloadEndpoint="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--mnfv8-eth0" Dec 13 14:17:13.543457 env[1824]: 2024-12-13 14:17:13.466 [INFO][4787] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali84fc5a9b2e7 ContainerID="67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1" Namespace="calico-apiserver" Pod="calico-apiserver-5fbcf8bc7f-mnfv8" WorkloadEndpoint="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--mnfv8-eth0" Dec 13 14:17:13.543457 env[1824]: 2024-12-13 14:17:13.503 [INFO][4787] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1" Namespace="calico-apiserver" Pod="calico-apiserver-5fbcf8bc7f-mnfv8" WorkloadEndpoint="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--mnfv8-eth0" Dec 13 14:17:13.543457 env[1824]: 2024-12-13 14:17:13.504 [INFO][4787] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1" Namespace="calico-apiserver" Pod="calico-apiserver-5fbcf8bc7f-mnfv8" WorkloadEndpoint="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--mnfv8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--mnfv8-eth0", GenerateName:"calico-apiserver-5fbcf8bc7f-", Namespace:"calico-apiserver", SelfLink:"", UID:"f5a3f4a9-fdfd-48cb-a792-bf6570e63fbf", ResourceVersion:"859", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5fbcf8bc7f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-24-217", ContainerID:"67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1", Pod:"calico-apiserver-5fbcf8bc7f-mnfv8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.49.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali84fc5a9b2e7", MAC:"0a:63:19:05:3f:8c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:13.543457 env[1824]: 2024-12-13 14:17:13.538 [INFO][4787] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1" Namespace="calico-apiserver" Pod="calico-apiserver-5fbcf8bc7f-mnfv8" WorkloadEndpoint="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--mnfv8-eth0" Dec 13 14:17:13.559934 systemd-networkd[1536]: calia421194004a: Gained IPv6LL Dec 13 14:17:13.615264 env[1824]: time="2024-12-13T14:17:13.614399246Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:17:13.615264 env[1824]: time="2024-12-13T14:17:13.614970950Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:17:13.622955 env[1824]: time="2024-12-13T14:17:13.615240253Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:17:13.627184 env[1824]: time="2024-12-13T14:17:13.624727233Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1 pid=4850 runtime=io.containerd.runc.v2 Dec 13 14:17:13.707000 audit[4870]: NETFILTER_CFG table=filter:106 family=2 entries=46 op=nft_register_chain pid=4870 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:13.707000 audit[4870]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23892 a0=3 a1=fffffcfeeef0 a2=0 a3=ffffb5ef6fa8 items=0 ppid=4092 pid=4870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.707000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:13.718660 systemd[1]: Started cri-containerd-67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1.scope. Dec 13 14:17:13.786462 env[1824]: 2024-12-13 14:17:13.555 [INFO][4822] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" Dec 13 14:17:13.786462 env[1824]: 2024-12-13 14:17:13.555 [INFO][4822] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" iface="eth0" netns="/var/run/netns/cni-67f9c551-6fd6-932a-1226-b1764be0f34b" Dec 13 14:17:13.786462 env[1824]: 2024-12-13 14:17:13.556 [INFO][4822] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" iface="eth0" netns="/var/run/netns/cni-67f9c551-6fd6-932a-1226-b1764be0f34b" Dec 13 14:17:13.786462 env[1824]: 2024-12-13 14:17:13.556 [INFO][4822] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" iface="eth0" netns="/var/run/netns/cni-67f9c551-6fd6-932a-1226-b1764be0f34b" Dec 13 14:17:13.786462 env[1824]: 2024-12-13 14:17:13.556 [INFO][4822] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" Dec 13 14:17:13.786462 env[1824]: 2024-12-13 14:17:13.556 [INFO][4822] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" Dec 13 14:17:13.786462 env[1824]: 2024-12-13 14:17:13.748 [INFO][4835] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" HandleID="k8s-pod-network.e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" Workload="ip--172--31--24--217-k8s-calico--kube--controllers--56dc846f8d--88fpd-eth0" Dec 13 14:17:13.786462 env[1824]: 2024-12-13 14:17:13.749 [INFO][4835] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:13.786462 env[1824]: 2024-12-13 14:17:13.749 [INFO][4835] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:13.786462 env[1824]: 2024-12-13 14:17:13.771 [WARNING][4835] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" HandleID="k8s-pod-network.e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" Workload="ip--172--31--24--217-k8s-calico--kube--controllers--56dc846f8d--88fpd-eth0" Dec 13 14:17:13.786462 env[1824]: 2024-12-13 14:17:13.771 [INFO][4835] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" HandleID="k8s-pod-network.e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" Workload="ip--172--31--24--217-k8s-calico--kube--controllers--56dc846f8d--88fpd-eth0" Dec 13 14:17:13.786462 env[1824]: 2024-12-13 14:17:13.774 [INFO][4835] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:13.786462 env[1824]: 2024-12-13 14:17:13.778 [INFO][4822] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" Dec 13 14:17:13.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.788000 audit: BPF prog-id=188 op=LOAD Dec 13 14:17:13.791390 env[1824]: time="2024-12-13T14:17:13.791309289Z" level=info msg="TearDown network for sandbox \"e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223\" successfully" Dec 13 14:17:13.791786 env[1824]: time="2024-12-13T14:17:13.791715326Z" level=info msg="StopPodSandbox for \"e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223\" returns successfully" Dec 13 14:17:13.791000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.791000 audit[4863]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4850 pid=4863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637656463663035343630613164373762613332646339373961653863 Dec 13 14:17:13.791000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.794395 env[1824]: time="2024-12-13T14:17:13.794328290Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-56dc846f8d-88fpd,Uid:3fe07beb-f75f-4d6e-8ba9-f2ae93fab6db,Namespace:calico-system,Attempt:1,}" Dec 13 14:17:13.791000 audit[4863]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4850 pid=4863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637656463663035343630613164373762613332646339373961653863 Dec 13 14:17:13.796000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.796000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.796000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.796000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.796000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.796000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.796000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.796000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.796000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.796000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.796000 audit: BPF prog-id=189 op=LOAD Dec 13 14:17:13.796000 audit[4863]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4850 pid=4863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637656463663035343630613164373762613332646339373961653863 Dec 13 14:17:13.801000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.801000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.801000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.801000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.801000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.801000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.801000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.801000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.801000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.801000 audit: BPF prog-id=190 op=LOAD Dec 13 14:17:13.801000 audit[4863]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4850 pid=4863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637656463663035343630613164373762613332646339373961653863 Dec 13 14:17:13.810000 audit: BPF prog-id=190 op=UNLOAD Dec 13 14:17:13.812000 audit: BPF prog-id=189 op=UNLOAD Dec 13 14:17:13.813000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.813000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.813000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.813000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.813000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.813000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.813000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.813000 audit[4863]: AVC avc: denied { perfmon } for pid=4863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.813000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.813000 audit[4863]: AVC avc: denied { bpf } for pid=4863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.813000 audit: BPF prog-id=191 op=LOAD Dec 13 14:17:13.813000 audit[4863]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4850 pid=4863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637656463663035343630613164373762613332646339373961653863 Dec 13 14:17:13.911484 systemd[1]: run-netns-cni\x2d67f9c551\x2d6fd6\x2d932a\x2d1226\x2db1764be0f34b.mount: Deactivated successfully. Dec 13 14:17:14.002151 kubelet[2897]: I1213 14:17:14.001236 2897 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-xg6zq" podStartSLOduration=42.001209655 podStartE2EDuration="42.001209655s" podCreationTimestamp="2024-12-13 14:16:32 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:17:13.951573023 +0000 UTC m=+54.931176446" watchObservedRunningTime="2024-12-13 14:17:14.001209655 +0000 UTC m=+54.980813042" Dec 13 14:17:14.011000 audit[4897]: NETFILTER_CFG table=filter:107 family=2 entries=16 op=nft_register_rule pid=4897 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:14.011000 audit[4897]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffdcf40860 a2=0 a3=1 items=0 ppid=3062 pid=4897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.011000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:14.025000 audit[4897]: NETFILTER_CFG table=nat:108 family=2 entries=14 op=nft_register_rule pid=4897 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:14.027000 audit[2762]: AVC avc: denied { watch } for pid=2762 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:14.027000 audit[2762]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40019dc1e0 a2=fc6 a3=0 items=0 ppid=2530 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:17:14.027000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:17:14.028000 audit[2762]: AVC avc: denied { watch } for pid=2762 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:14.028000 audit[2762]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001f495f0 a2=fc6 a3=0 items=0 ppid=2530 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:17:14.028000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:17:14.025000 audit[4897]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffdcf40860 a2=0 a3=1 items=0 ppid=3062 pid=4897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.025000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:14.114000 audit[4907]: NETFILTER_CFG table=filter:109 family=2 entries=13 op=nft_register_rule pid=4907 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:14.114000 audit[4907]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffffad23a10 a2=0 a3=1 items=0 ppid=3062 pid=4907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.114000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:14.201004 env[1824]: time="2024-12-13T14:17:14.200691424Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5fbcf8bc7f-mnfv8,Uid:f5a3f4a9-fdfd-48cb-a792-bf6570e63fbf,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1\"" Dec 13 14:17:14.218000 audit[4907]: NETFILTER_CFG table=nat:110 family=2 entries=35 op=nft_register_chain pid=4907 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:14.218000 audit[4907]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=fffffad23a10 a2=0 a3=1 items=0 ppid=3062 pid=4907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.218000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:14.322717 systemd-networkd[1536]: calidf1dcea19f6: Link UP Dec 13 14:17:14.328347 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidf1dcea19f6: link becomes ready Dec 13 14:17:14.328578 systemd-networkd[1536]: calidf1dcea19f6: Gained carrier Dec 13 14:17:14.366150 env[1824]: 2024-12-13 14:17:14.063 [INFO][4885] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--24--217-k8s-calico--kube--controllers--56dc846f8d--88fpd-eth0 calico-kube-controllers-56dc846f8d- calico-system 3fe07beb-f75f-4d6e-8ba9-f2ae93fab6db 869 0 2024-12-13 14:16:42 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:56dc846f8d projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-24-217 calico-kube-controllers-56dc846f8d-88fpd eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calidf1dcea19f6 [] []}} ContainerID="a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb" Namespace="calico-system" Pod="calico-kube-controllers-56dc846f8d-88fpd" WorkloadEndpoint="ip--172--31--24--217-k8s-calico--kube--controllers--56dc846f8d--88fpd-" Dec 13 14:17:14.366150 env[1824]: 2024-12-13 14:17:14.063 [INFO][4885] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb" Namespace="calico-system" Pod="calico-kube-controllers-56dc846f8d-88fpd" WorkloadEndpoint="ip--172--31--24--217-k8s-calico--kube--controllers--56dc846f8d--88fpd-eth0" Dec 13 14:17:14.366150 env[1824]: 2024-12-13 14:17:14.231 [INFO][4908] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb" HandleID="k8s-pod-network.a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb" Workload="ip--172--31--24--217-k8s-calico--kube--controllers--56dc846f8d--88fpd-eth0" Dec 13 14:17:14.366150 env[1824]: 2024-12-13 14:17:14.250 [INFO][4908] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb" HandleID="k8s-pod-network.a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb" Workload="ip--172--31--24--217-k8s-calico--kube--controllers--56dc846f8d--88fpd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000423bc0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-24-217", "pod":"calico-kube-controllers-56dc846f8d-88fpd", "timestamp":"2024-12-13 14:17:14.231037765 +0000 UTC"}, Hostname:"ip-172-31-24-217", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:17:14.366150 env[1824]: 2024-12-13 14:17:14.250 [INFO][4908] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:14.366150 env[1824]: 2024-12-13 14:17:14.250 [INFO][4908] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:14.366150 env[1824]: 2024-12-13 14:17:14.251 [INFO][4908] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-24-217' Dec 13 14:17:14.366150 env[1824]: 2024-12-13 14:17:14.254 [INFO][4908] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb" host="ip-172-31-24-217" Dec 13 14:17:14.366150 env[1824]: 2024-12-13 14:17:14.262 [INFO][4908] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-24-217" Dec 13 14:17:14.366150 env[1824]: 2024-12-13 14:17:14.272 [INFO][4908] ipam/ipam.go 489: Trying affinity for 192.168.49.64/26 host="ip-172-31-24-217" Dec 13 14:17:14.366150 env[1824]: 2024-12-13 14:17:14.276 [INFO][4908] ipam/ipam.go 155: Attempting to load block cidr=192.168.49.64/26 host="ip-172-31-24-217" Dec 13 14:17:14.366150 env[1824]: 2024-12-13 14:17:14.281 [INFO][4908] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.49.64/26 host="ip-172-31-24-217" Dec 13 14:17:14.366150 env[1824]: 2024-12-13 14:17:14.282 [INFO][4908] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.49.64/26 handle="k8s-pod-network.a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb" host="ip-172-31-24-217" Dec 13 14:17:14.366150 env[1824]: 2024-12-13 14:17:14.284 [INFO][4908] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb Dec 13 14:17:14.366150 env[1824]: 2024-12-13 14:17:14.300 [INFO][4908] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.49.64/26 handle="k8s-pod-network.a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb" host="ip-172-31-24-217" Dec 13 14:17:14.366150 env[1824]: 2024-12-13 14:17:14.313 [INFO][4908] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.49.70/26] block=192.168.49.64/26 handle="k8s-pod-network.a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb" host="ip-172-31-24-217" Dec 13 14:17:14.366150 env[1824]: 2024-12-13 14:17:14.314 [INFO][4908] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.49.70/26] handle="k8s-pod-network.a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb" host="ip-172-31-24-217" Dec 13 14:17:14.366150 env[1824]: 2024-12-13 14:17:14.314 [INFO][4908] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:14.366150 env[1824]: 2024-12-13 14:17:14.314 [INFO][4908] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.49.70/26] IPv6=[] ContainerID="a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb" HandleID="k8s-pod-network.a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb" Workload="ip--172--31--24--217-k8s-calico--kube--controllers--56dc846f8d--88fpd-eth0" Dec 13 14:17:14.367709 env[1824]: 2024-12-13 14:17:14.317 [INFO][4885] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb" Namespace="calico-system" Pod="calico-kube-controllers-56dc846f8d-88fpd" WorkloadEndpoint="ip--172--31--24--217-k8s-calico--kube--controllers--56dc846f8d--88fpd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--24--217-k8s-calico--kube--controllers--56dc846f8d--88fpd-eth0", GenerateName:"calico-kube-controllers-56dc846f8d-", Namespace:"calico-system", SelfLink:"", UID:"3fe07beb-f75f-4d6e-8ba9-f2ae93fab6db", ResourceVersion:"869", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"56dc846f8d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-24-217", ContainerID:"", Pod:"calico-kube-controllers-56dc846f8d-88fpd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.49.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calidf1dcea19f6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:14.367709 env[1824]: 2024-12-13 14:17:14.318 [INFO][4885] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.49.70/32] ContainerID="a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb" Namespace="calico-system" Pod="calico-kube-controllers-56dc846f8d-88fpd" WorkloadEndpoint="ip--172--31--24--217-k8s-calico--kube--controllers--56dc846f8d--88fpd-eth0" Dec 13 14:17:14.367709 env[1824]: 2024-12-13 14:17:14.318 [INFO][4885] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calidf1dcea19f6 ContainerID="a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb" Namespace="calico-system" Pod="calico-kube-controllers-56dc846f8d-88fpd" WorkloadEndpoint="ip--172--31--24--217-k8s-calico--kube--controllers--56dc846f8d--88fpd-eth0" Dec 13 14:17:14.367709 env[1824]: 2024-12-13 14:17:14.330 [INFO][4885] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb" Namespace="calico-system" Pod="calico-kube-controllers-56dc846f8d-88fpd" WorkloadEndpoint="ip--172--31--24--217-k8s-calico--kube--controllers--56dc846f8d--88fpd-eth0" Dec 13 14:17:14.367709 env[1824]: 2024-12-13 14:17:14.331 [INFO][4885] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb" Namespace="calico-system" Pod="calico-kube-controllers-56dc846f8d-88fpd" WorkloadEndpoint="ip--172--31--24--217-k8s-calico--kube--controllers--56dc846f8d--88fpd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--24--217-k8s-calico--kube--controllers--56dc846f8d--88fpd-eth0", GenerateName:"calico-kube-controllers-56dc846f8d-", Namespace:"calico-system", SelfLink:"", UID:"3fe07beb-f75f-4d6e-8ba9-f2ae93fab6db", ResourceVersion:"869", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"56dc846f8d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-24-217", ContainerID:"a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb", Pod:"calico-kube-controllers-56dc846f8d-88fpd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.49.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calidf1dcea19f6", MAC:"8a:fc:93:82:3c:4a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:14.367709 env[1824]: 2024-12-13 14:17:14.362 [INFO][4885] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb" Namespace="calico-system" Pod="calico-kube-controllers-56dc846f8d-88fpd" WorkloadEndpoint="ip--172--31--24--217-k8s-calico--kube--controllers--56dc846f8d--88fpd-eth0" Dec 13 14:17:14.401960 env[1824]: time="2024-12-13T14:17:14.401685986Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:17:14.401960 env[1824]: time="2024-12-13T14:17:14.401804923Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:17:14.401960 env[1824]: time="2024-12-13T14:17:14.401855973Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:17:14.402745 env[1824]: time="2024-12-13T14:17:14.402637217Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb pid=4934 runtime=io.containerd.runc.v2 Dec 13 14:17:14.425000 audit[4945]: NETFILTER_CFG table=filter:111 family=2 entries=50 op=nft_register_chain pid=4945 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:14.425000 audit[4945]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23392 a0=3 a1=fffff207fce0 a2=0 a3=ffffae184fa8 items=0 ppid=4092 pid=4945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.425000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:14.454823 systemd[1]: Started cri-containerd-a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb.scope. Dec 13 14:17:14.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.537000 audit: BPF prog-id=192 op=LOAD Dec 13 14:17:14.539000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.539000 audit[4946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4934 pid=4946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137613237376339396166343839633864376531336535336630316636 Dec 13 14:17:14.539000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.539000 audit[4946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4934 pid=4946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137613237376339396166343839633864376531336535336630316636 Dec 13 14:17:14.539000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.539000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.539000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.539000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.539000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.539000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.539000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.539000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.539000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.539000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.539000 audit: BPF prog-id=193 op=LOAD Dec 13 14:17:14.539000 audit[4946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4934 pid=4946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137613237376339396166343839633864376531336535336630316636 Dec 13 14:17:14.540000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.540000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.540000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.540000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.540000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.540000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.540000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.540000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.540000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.540000 audit: BPF prog-id=194 op=LOAD Dec 13 14:17:14.540000 audit[4946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4934 pid=4946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137613237376339396166343839633864376531336535336630316636 Dec 13 14:17:14.541000 audit: BPF prog-id=194 op=UNLOAD Dec 13 14:17:14.541000 audit: BPF prog-id=193 op=UNLOAD Dec 13 14:17:14.541000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.541000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.541000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.541000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.541000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.541000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.541000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.541000 audit[4946]: AVC avc: denied { perfmon } for pid=4946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.541000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.541000 audit[4946]: AVC avc: denied { bpf } for pid=4946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.541000 audit: BPF prog-id=195 op=LOAD Dec 13 14:17:14.541000 audit[4946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4934 pid=4946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137613237376339396166343839633864376531336535336630316636 Dec 13 14:17:14.623574 env[1824]: time="2024-12-13T14:17:14.623490225Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-56dc846f8d-88fpd,Uid:3fe07beb-f75f-4d6e-8ba9-f2ae93fab6db,Namespace:calico-system,Attempt:1,} returns sandbox id \"a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb\"" Dec 13 14:17:14.808000 audit[2769]: AVC avc: denied { watch } for pid=2769 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=8274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:14.811833 kernel: kauditd_printk_skb: 788 callbacks suppressed Dec 13 14:17:14.812002 kernel: audit: type=1400 audit(1734099434.808:1301): avc: denied { watch } for pid=2769 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=8274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:14.815000 audit[2769]: AVC avc: denied { watch } for pid=2769 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:14.832814 kernel: audit: type=1400 audit(1734099434.815:1302): avc: denied { watch } for pid=2769 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:14.815000 audit[2769]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=40099b21e0 a2=fc6 a3=0 items=0 ppid=2499 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 key=(null) Dec 13 14:17:14.845150 kernel: audit: type=1300 audit(1734099434.815:1302): arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=40099b21e0 a2=fc6 a3=0 items=0 ppid=2499 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 key=(null) Dec 13 14:17:14.815000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32342E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:17:14.856958 kernel: audit: type=1327 audit(1734099434.815:1302): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32342E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:17:14.808000 audit[2769]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4004da5d70 a2=fc6 a3=0 items=0 ppid=2499 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 key=(null) Dec 13 14:17:14.808000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32342E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:17:14.872334 kernel: audit: type=1300 audit(1734099434.808:1301): arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4004da5d70 a2=fc6 a3=0 items=0 ppid=2499 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 key=(null) Dec 13 14:17:14.902172 kernel: audit: type=1327 audit(1734099434.808:1301): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32342E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:17:14.902382 kernel: audit: type=1400 audit(1734099434.844:1303): avc: denied { watch } for pid=2769 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=8281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:14.844000 audit[2769]: AVC avc: denied { watch } for pid=2769 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=8281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:14.844000 audit[2769]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4005accf00 a2=fc6 a3=0 items=0 ppid=2499 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 key=(null) Dec 13 14:17:14.915073 kernel: audit: type=1300 audit(1734099434.844:1303): arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=4005accf00 a2=fc6 a3=0 items=0 ppid=2499 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 key=(null) Dec 13 14:17:14.844000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32342E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:17:14.926252 kernel: audit: type=1327 audit(1734099434.844:1303): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32342E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:17:14.844000 audit[2769]: AVC avc: denied { watch } for pid=2769 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:14.844000 audit[2769]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=40098b3440 a2=fc6 a3=0 items=0 ppid=2499 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 key=(null) Dec 13 14:17:14.844000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32342E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:17:14.937305 kernel: audit: type=1400 audit(1734099434.844:1304): avc: denied { watch } for pid=2769 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:14.952000 audit[2769]: AVC avc: denied { watch } for pid=2769 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:14.952000 audit[2769]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=40048cfe00 a2=fc6 a3=0 items=0 ppid=2499 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 key=(null) Dec 13 14:17:14.952000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32342E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:17:14.952000 audit[2769]: AVC avc: denied { watch } for pid=2769 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:14.952000 audit[2769]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=40076e9600 a2=fc6 a3=0 items=0 ppid=2499 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 key=(null) Dec 13 14:17:14.952000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32342E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:17:15.171783 env[1824]: time="2024-12-13T14:17:15.171597775Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:15.178101 env[1824]: time="2024-12-13T14:17:15.178017822Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:15.183969 env[1824]: time="2024-12-13T14:17:15.183884768Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:15.189857 env[1824]: time="2024-12-13T14:17:15.189756862Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:15.192947 env[1824]: time="2024-12-13T14:17:15.191498694Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163\"" Dec 13 14:17:15.196748 env[1824]: time="2024-12-13T14:17:15.196695245Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:17:15.202172 env[1824]: time="2024-12-13T14:17:15.198870270Z" level=info msg="CreateContainer within sandbox \"cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:17:15.246292 env[1824]: time="2024-12-13T14:17:15.246206676Z" level=info msg="CreateContainer within sandbox \"cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"9cf32bc9442cbeb5083afdd285f5f6295e87b00d28618d4ab5205df40d1bb85e\"" Dec 13 14:17:15.247659 env[1824]: time="2024-12-13T14:17:15.247575845Z" level=info msg="StartContainer for \"9cf32bc9442cbeb5083afdd285f5f6295e87b00d28618d4ab5205df40d1bb85e\"" Dec 13 14:17:15.296043 systemd[1]: Started cri-containerd-9cf32bc9442cbeb5083afdd285f5f6295e87b00d28618d4ab5205df40d1bb85e.scope. Dec 13 14:17:15.325478 systemd[1]: run-containerd-runc-k8s.io-9cf32bc9442cbeb5083afdd285f5f6295e87b00d28618d4ab5205df40d1bb85e-runc.x1vIbE.mount: Deactivated successfully. Dec 13 14:17:15.362000 audit[4991]: NETFILTER_CFG table=filter:112 family=2 entries=10 op=nft_register_rule pid=4991 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:15.362000 audit[4991]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffe6ddf6d0 a2=0 a3=1 items=0 ppid=3062 pid=4991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:15.362000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:15.386000 audit[4991]: NETFILTER_CFG table=nat:113 family=2 entries=56 op=nft_register_chain pid=4991 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:15.386000 audit[4991]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffe6ddf6d0 a2=0 a3=1 items=0 ppid=3062 pid=4991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:15.386000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:15.416519 systemd-networkd[1536]: cali84fc5a9b2e7: Gained IPv6LL Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { perfmon } for pid=4981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit[4981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4563 pid=4981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:15.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963663332626339343432636265623530383361666464323835663566 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { bpf } for pid=4981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { bpf } for pid=4981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { bpf } for pid=4981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { perfmon } for pid=4981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { perfmon } for pid=4981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { perfmon } for pid=4981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { perfmon } for pid=4981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { perfmon } for pid=4981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { bpf } for pid=4981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { bpf } for pid=4981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit: BPF prog-id=196 op=LOAD Dec 13 14:17:15.420000 audit[4981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4563 pid=4981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:15.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963663332626339343432636265623530383361666464323835663566 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { bpf } for pid=4981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { bpf } for pid=4981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { perfmon } for pid=4981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { perfmon } for pid=4981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { perfmon } for pid=4981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { perfmon } for pid=4981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { perfmon } for pid=4981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { bpf } for pid=4981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { bpf } for pid=4981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit: BPF prog-id=197 op=LOAD Dec 13 14:17:15.420000 audit[4981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4563 pid=4981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:15.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963663332626339343432636265623530383361666464323835663566 Dec 13 14:17:15.420000 audit: BPF prog-id=197 op=UNLOAD Dec 13 14:17:15.420000 audit: BPF prog-id=196 op=UNLOAD Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { bpf } for pid=4981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { bpf } for pid=4981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { bpf } for pid=4981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { perfmon } for pid=4981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { perfmon } for pid=4981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { perfmon } for pid=4981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { perfmon } for pid=4981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { perfmon } for pid=4981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { bpf } for pid=4981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit[4981]: AVC avc: denied { bpf } for pid=4981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.420000 audit: BPF prog-id=198 op=LOAD Dec 13 14:17:15.420000 audit[4981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4563 pid=4981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:15.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963663332626339343432636265623530383361666464323835663566 Dec 13 14:17:15.456840 env[1824]: time="2024-12-13T14:17:15.456776531Z" level=info msg="StartContainer for \"9cf32bc9442cbeb5083afdd285f5f6295e87b00d28618d4ab5205df40d1bb85e\" returns successfully" Dec 13 14:17:15.607824 systemd-networkd[1536]: calidf1dcea19f6: Gained IPv6LL Dec 13 14:17:15.719271 systemd[1]: Started sshd@9-172.31.24.217:22-139.178.89.65:40876.service. Dec 13 14:17:15.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.24.217:22-139.178.89.65:40876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:15.924572 sshd[5011]: Accepted publickey for core from 139.178.89.65 port 40876 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:15.923000 audit[5011]: USER_ACCT pid=5011 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:15.925000 audit[5011]: CRED_ACQ pid=5011 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:15.925000 audit[5011]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc15a4e50 a2=3 a3=1 items=0 ppid=1 pid=5011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:15.925000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:15.928681 sshd[5011]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:15.939346 systemd-logind[1805]: New session 10 of user core. Dec 13 14:17:15.939909 systemd[1]: Started session-10.scope. Dec 13 14:17:15.955000 audit[5011]: USER_START pid=5011 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:15.959000 audit[5013]: CRED_ACQ pid=5013 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:16.296922 sshd[5011]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:16.299000 audit[5011]: USER_END pid=5011 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:16.300000 audit[5011]: CRED_DISP pid=5011 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:16.304003 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 14:17:16.305817 systemd[1]: sshd@9-172.31.24.217:22-139.178.89.65:40876.service: Deactivated successfully. Dec 13 14:17:16.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.24.217:22-139.178.89.65:40876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:16.309502 systemd-logind[1805]: Session 10 logged out. Waiting for processes to exit. Dec 13 14:17:16.313934 systemd-logind[1805]: Removed session 10. Dec 13 14:17:19.305460 env[1824]: time="2024-12-13T14:17:19.305331354Z" level=info msg="StopPodSandbox for \"b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f\"" Dec 13 14:17:19.575024 env[1824]: 2024-12-13 14:17:19.444 [WARNING][5040] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--24--217-k8s-coredns--7db6d8ff4d--xg6zq-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"beeed929-9ff9-469f-a97d-206e30099032", ResourceVersion:"874", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-24-217", ContainerID:"cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a", Pod:"coredns-7db6d8ff4d-xg6zq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.49.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie1d7807c7f8", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:19.575024 env[1824]: 2024-12-13 14:17:19.444 [INFO][5040] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" Dec 13 14:17:19.575024 env[1824]: 2024-12-13 14:17:19.444 [INFO][5040] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" iface="eth0" netns="" Dec 13 14:17:19.575024 env[1824]: 2024-12-13 14:17:19.444 [INFO][5040] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" Dec 13 14:17:19.575024 env[1824]: 2024-12-13 14:17:19.444 [INFO][5040] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" Dec 13 14:17:19.575024 env[1824]: 2024-12-13 14:17:19.545 [INFO][5048] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" HandleID="k8s-pod-network.b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" Workload="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--xg6zq-eth0" Dec 13 14:17:19.575024 env[1824]: 2024-12-13 14:17:19.548 [INFO][5048] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:19.575024 env[1824]: 2024-12-13 14:17:19.549 [INFO][5048] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:19.575024 env[1824]: 2024-12-13 14:17:19.565 [WARNING][5048] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" HandleID="k8s-pod-network.b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" Workload="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--xg6zq-eth0" Dec 13 14:17:19.575024 env[1824]: 2024-12-13 14:17:19.565 [INFO][5048] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" HandleID="k8s-pod-network.b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" Workload="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--xg6zq-eth0" Dec 13 14:17:19.575024 env[1824]: 2024-12-13 14:17:19.568 [INFO][5048] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:19.575024 env[1824]: 2024-12-13 14:17:19.571 [INFO][5040] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" Dec 13 14:17:19.576530 env[1824]: time="2024-12-13T14:17:19.576472507Z" level=info msg="TearDown network for sandbox \"b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f\" successfully" Dec 13 14:17:19.576716 env[1824]: time="2024-12-13T14:17:19.576666254Z" level=info msg="StopPodSandbox for \"b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f\" returns successfully" Dec 13 14:17:19.578255 env[1824]: time="2024-12-13T14:17:19.578198324Z" level=info msg="RemovePodSandbox for \"b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f\"" Dec 13 14:17:19.578553 env[1824]: time="2024-12-13T14:17:19.578476446Z" level=info msg="Forcibly stopping sandbox \"b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f\"" Dec 13 14:17:19.777604 env[1824]: 2024-12-13 14:17:19.685 [WARNING][5071] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--24--217-k8s-coredns--7db6d8ff4d--xg6zq-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"beeed929-9ff9-469f-a97d-206e30099032", ResourceVersion:"874", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-24-217", ContainerID:"cce195fc5f5b296e5b1cd3b6e02b1b0d305c79f8433f5b065a341ebda0508f6a", Pod:"coredns-7db6d8ff4d-xg6zq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.49.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie1d7807c7f8", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:19.777604 env[1824]: 2024-12-13 14:17:19.686 [INFO][5071] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" Dec 13 14:17:19.777604 env[1824]: 2024-12-13 14:17:19.686 [INFO][5071] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" iface="eth0" netns="" Dec 13 14:17:19.777604 env[1824]: 2024-12-13 14:17:19.686 [INFO][5071] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" Dec 13 14:17:19.777604 env[1824]: 2024-12-13 14:17:19.686 [INFO][5071] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" Dec 13 14:17:19.777604 env[1824]: 2024-12-13 14:17:19.740 [INFO][5077] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" HandleID="k8s-pod-network.b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" Workload="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--xg6zq-eth0" Dec 13 14:17:19.777604 env[1824]: 2024-12-13 14:17:19.741 [INFO][5077] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:19.777604 env[1824]: 2024-12-13 14:17:19.741 [INFO][5077] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:19.777604 env[1824]: 2024-12-13 14:17:19.769 [WARNING][5077] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" HandleID="k8s-pod-network.b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" Workload="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--xg6zq-eth0" Dec 13 14:17:19.777604 env[1824]: 2024-12-13 14:17:19.769 [INFO][5077] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" HandleID="k8s-pod-network.b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" Workload="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--xg6zq-eth0" Dec 13 14:17:19.777604 env[1824]: 2024-12-13 14:17:19.772 [INFO][5077] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:19.777604 env[1824]: 2024-12-13 14:17:19.775 [INFO][5071] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f" Dec 13 14:17:19.779157 env[1824]: time="2024-12-13T14:17:19.779050643Z" level=info msg="TearDown network for sandbox \"b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f\" successfully" Dec 13 14:17:19.784189 env[1824]: time="2024-12-13T14:17:19.784063003Z" level=info msg="RemovePodSandbox \"b86f17116f0f59bc3626fa97919a5f01296b86b420dd6c332dee2b79fd8bf84f\" returns successfully" Dec 13 14:17:19.785371 env[1824]: time="2024-12-13T14:17:19.785302598Z" level=info msg="StopPodSandbox for \"39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351\"" Dec 13 14:17:20.086535 env[1824]: 2024-12-13 14:17:19.957 [WARNING][5098] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--l2sq4-eth0", GenerateName:"calico-apiserver-5fbcf8bc7f-", Namespace:"calico-apiserver", SelfLink:"", UID:"c77b0a0c-a45a-4fdb-9438-06ec79198e34", ResourceVersion:"849", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5fbcf8bc7f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-24-217", ContainerID:"3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185", Pod:"calico-apiserver-5fbcf8bc7f-l2sq4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.49.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia421194004a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:20.086535 env[1824]: 2024-12-13 14:17:19.958 [INFO][5098] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" Dec 13 14:17:20.086535 env[1824]: 2024-12-13 14:17:19.958 [INFO][5098] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" iface="eth0" netns="" Dec 13 14:17:20.086535 env[1824]: 2024-12-13 14:17:19.958 [INFO][5098] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" Dec 13 14:17:20.086535 env[1824]: 2024-12-13 14:17:19.958 [INFO][5098] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" Dec 13 14:17:20.086535 env[1824]: 2024-12-13 14:17:20.057 [INFO][5104] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" HandleID="k8s-pod-network.39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" Workload="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--l2sq4-eth0" Dec 13 14:17:20.086535 env[1824]: 2024-12-13 14:17:20.061 [INFO][5104] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:20.086535 env[1824]: 2024-12-13 14:17:20.061 [INFO][5104] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:20.086535 env[1824]: 2024-12-13 14:17:20.076 [WARNING][5104] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" HandleID="k8s-pod-network.39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" Workload="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--l2sq4-eth0" Dec 13 14:17:20.086535 env[1824]: 2024-12-13 14:17:20.076 [INFO][5104] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" HandleID="k8s-pod-network.39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" Workload="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--l2sq4-eth0" Dec 13 14:17:20.086535 env[1824]: 2024-12-13 14:17:20.079 [INFO][5104] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:20.086535 env[1824]: 2024-12-13 14:17:20.082 [INFO][5098] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" Dec 13 14:17:20.088170 env[1824]: time="2024-12-13T14:17:20.086578640Z" level=info msg="TearDown network for sandbox \"39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351\" successfully" Dec 13 14:17:20.088170 env[1824]: time="2024-12-13T14:17:20.086624649Z" level=info msg="StopPodSandbox for \"39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351\" returns successfully" Dec 13 14:17:20.088170 env[1824]: time="2024-12-13T14:17:20.087870820Z" level=info msg="RemovePodSandbox for \"39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351\"" Dec 13 14:17:20.088170 env[1824]: time="2024-12-13T14:17:20.087926958Z" level=info msg="Forcibly stopping sandbox \"39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351\"" Dec 13 14:17:20.229962 env[1824]: time="2024-12-13T14:17:20.229892728Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:20.241954 env[1824]: time="2024-12-13T14:17:20.241861218Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:20.255518 env[1824]: time="2024-12-13T14:17:20.255458151Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:20.263563 env[1824]: time="2024-12-13T14:17:20.263488538Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:20.273533 env[1824]: time="2024-12-13T14:17:20.267880244Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c\"" Dec 13 14:17:20.280854 env[1824]: time="2024-12-13T14:17:20.279535439Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:17:20.286169 env[1824]: time="2024-12-13T14:17:20.284664438Z" level=info msg="CreateContainer within sandbox \"3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:17:20.349060 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount59904256.mount: Deactivated successfully. Dec 13 14:17:20.352882 env[1824]: time="2024-12-13T14:17:20.352794874Z" level=info msg="CreateContainer within sandbox \"3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"9f2effb53841ba27a443985b05621eae5812e9a0560d68da3de035c0b7b2210b\"" Dec 13 14:17:20.359298 env[1824]: time="2024-12-13T14:17:20.359227490Z" level=info msg="StartContainer for \"9f2effb53841ba27a443985b05621eae5812e9a0560d68da3de035c0b7b2210b\"" Dec 13 14:17:20.398790 env[1824]: 2024-12-13 14:17:20.216 [WARNING][5123] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--l2sq4-eth0", GenerateName:"calico-apiserver-5fbcf8bc7f-", Namespace:"calico-apiserver", SelfLink:"", UID:"c77b0a0c-a45a-4fdb-9438-06ec79198e34", ResourceVersion:"849", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5fbcf8bc7f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-24-217", ContainerID:"3d6c38f4b9a618c5771cf960898d2040784fa051233917b572fa6b0805f92185", Pod:"calico-apiserver-5fbcf8bc7f-l2sq4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.49.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia421194004a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:20.398790 env[1824]: 2024-12-13 14:17:20.218 [INFO][5123] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" Dec 13 14:17:20.398790 env[1824]: 2024-12-13 14:17:20.218 [INFO][5123] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" iface="eth0" netns="" Dec 13 14:17:20.398790 env[1824]: 2024-12-13 14:17:20.218 [INFO][5123] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" Dec 13 14:17:20.398790 env[1824]: 2024-12-13 14:17:20.218 [INFO][5123] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" Dec 13 14:17:20.398790 env[1824]: 2024-12-13 14:17:20.367 [INFO][5130] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" HandleID="k8s-pod-network.39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" Workload="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--l2sq4-eth0" Dec 13 14:17:20.398790 env[1824]: 2024-12-13 14:17:20.370 [INFO][5130] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:20.398790 env[1824]: 2024-12-13 14:17:20.371 [INFO][5130] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:20.398790 env[1824]: 2024-12-13 14:17:20.387 [WARNING][5130] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" HandleID="k8s-pod-network.39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" Workload="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--l2sq4-eth0" Dec 13 14:17:20.398790 env[1824]: 2024-12-13 14:17:20.387 [INFO][5130] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" HandleID="k8s-pod-network.39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" Workload="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--l2sq4-eth0" Dec 13 14:17:20.398790 env[1824]: 2024-12-13 14:17:20.391 [INFO][5130] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:20.398790 env[1824]: 2024-12-13 14:17:20.394 [INFO][5123] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351" Dec 13 14:17:20.398790 env[1824]: time="2024-12-13T14:17:20.398524611Z" level=info msg="TearDown network for sandbox \"39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351\" successfully" Dec 13 14:17:20.420179 env[1824]: time="2024-12-13T14:17:20.420072392Z" level=info msg="RemovePodSandbox \"39b6c4b1e1c88813e68178970bcfa656a0eb4fe285abb20fb070adcf59fd7351\" returns successfully" Dec 13 14:17:20.422058 env[1824]: time="2024-12-13T14:17:20.421984370Z" level=info msg="StopPodSandbox for \"d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac\"" Dec 13 14:17:20.451054 systemd[1]: run-containerd-runc-k8s.io-9f2effb53841ba27a443985b05621eae5812e9a0560d68da3de035c0b7b2210b-runc.E2c2aU.mount: Deactivated successfully. Dec 13 14:17:20.464288 systemd[1]: Started cri-containerd-9f2effb53841ba27a443985b05621eae5812e9a0560d68da3de035c0b7b2210b.scope. Dec 13 14:17:20.526883 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 14:17:20.527060 kernel: audit: type=1400 audit(1734099440.517:1324): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.534962 kernel: audit: type=1400 audit(1734099440.517:1325): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.542902 kernel: audit: type=1400 audit(1734099440.517:1326): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.550800 kernel: audit: type=1400 audit(1734099440.517:1327): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.562589 kernel: audit: type=1400 audit(1734099440.517:1328): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.576053 kernel: audit: type=1400 audit(1734099440.517:1329): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.576230 kernel: audit: type=1400 audit(1734099440.517:1330): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.582300 kernel: audit: type=1400 audit(1734099440.517:1331): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.601569 kernel: audit: type=1400 audit(1734099440.517:1332): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.612601 kernel: audit: type=1400 audit(1734099440.519:1333): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.519000 audit: BPF prog-id=199 op=LOAD Dec 13 14:17:20.528000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.528000 audit[5148]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4622 pid=5148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966326566666235333834316261323761343433393835623035363231 Dec 13 14:17:20.528000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.528000 audit[5148]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4622 pid=5148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966326566666235333834316261323761343433393835623035363231 Dec 13 14:17:20.528000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.528000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.528000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.528000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.528000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.528000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.528000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.528000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.528000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.528000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.528000 audit: BPF prog-id=200 op=LOAD Dec 13 14:17:20.528000 audit[5148]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4622 pid=5148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966326566666235333834316261323761343433393835623035363231 Dec 13 14:17:20.534000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.534000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.534000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.534000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.534000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.534000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.534000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.534000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.534000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.534000 audit: BPF prog-id=201 op=LOAD Dec 13 14:17:20.534000 audit[5148]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4622 pid=5148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966326566666235333834316261323761343433393835623035363231 Dec 13 14:17:20.535000 audit: BPF prog-id=201 op=UNLOAD Dec 13 14:17:20.535000 audit: BPF prog-id=200 op=UNLOAD Dec 13 14:17:20.535000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.535000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.535000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.535000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.535000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.535000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.535000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.535000 audit[5148]: AVC avc: denied { perfmon } for pid=5148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.535000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.535000 audit[5148]: AVC avc: denied { bpf } for pid=5148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.535000 audit: BPF prog-id=202 op=LOAD Dec 13 14:17:20.535000 audit[5148]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4622 pid=5148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966326566666235333834316261323761343433393835623035363231 Dec 13 14:17:20.641588 env[1824]: time="2024-12-13T14:17:20.641501450Z" level=info msg="StartContainer for \"9f2effb53841ba27a443985b05621eae5812e9a0560d68da3de035c0b7b2210b\" returns successfully" Dec 13 14:17:20.656042 env[1824]: time="2024-12-13T14:17:20.655909683Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:20.662408 env[1824]: time="2024-12-13T14:17:20.662332543Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:20.667370 env[1824]: time="2024-12-13T14:17:20.667298685Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:20.670955 env[1824]: time="2024-12-13T14:17:20.670883627Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:20.672564 env[1824]: time="2024-12-13T14:17:20.672495018Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c\"" Dec 13 14:17:20.677574 env[1824]: time="2024-12-13T14:17:20.676214642Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 14:17:20.691076 env[1824]: time="2024-12-13T14:17:20.690967274Z" level=info msg="CreateContainer within sandbox \"67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:17:20.740202 env[1824]: time="2024-12-13T14:17:20.740025421Z" level=info msg="CreateContainer within sandbox \"67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"e63aaa61aacdc01e07d8baaa826e864c6cded7f881a595049cde9db7080a91c2\"" Dec 13 14:17:20.741786 env[1824]: time="2024-12-13T14:17:20.741707087Z" level=info msg="StartContainer for \"e63aaa61aacdc01e07d8baaa826e864c6cded7f881a595049cde9db7080a91c2\"" Dec 13 14:17:20.763290 env[1824]: 2024-12-13 14:17:20.613 [WARNING][5172] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--24--217-k8s-coredns--7db6d8ff4d--7rpbw-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"eaf54e69-06a6-44c4-9afc-ea6802f54674", ResourceVersion:"876", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-24-217", ContainerID:"aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8", Pod:"coredns-7db6d8ff4d-7rpbw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.49.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5fe6c36e5ca", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:20.763290 env[1824]: 2024-12-13 14:17:20.613 [INFO][5172] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" Dec 13 14:17:20.763290 env[1824]: 2024-12-13 14:17:20.613 [INFO][5172] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" iface="eth0" netns="" Dec 13 14:17:20.763290 env[1824]: 2024-12-13 14:17:20.613 [INFO][5172] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" Dec 13 14:17:20.763290 env[1824]: 2024-12-13 14:17:20.614 [INFO][5172] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" Dec 13 14:17:20.763290 env[1824]: 2024-12-13 14:17:20.713 [INFO][5187] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" HandleID="k8s-pod-network.d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" Workload="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--7rpbw-eth0" Dec 13 14:17:20.763290 env[1824]: 2024-12-13 14:17:20.713 [INFO][5187] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:20.763290 env[1824]: 2024-12-13 14:17:20.714 [INFO][5187] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:20.763290 env[1824]: 2024-12-13 14:17:20.732 [WARNING][5187] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" HandleID="k8s-pod-network.d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" Workload="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--7rpbw-eth0" Dec 13 14:17:20.763290 env[1824]: 2024-12-13 14:17:20.733 [INFO][5187] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" HandleID="k8s-pod-network.d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" Workload="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--7rpbw-eth0" Dec 13 14:17:20.763290 env[1824]: 2024-12-13 14:17:20.751 [INFO][5187] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:20.763290 env[1824]: 2024-12-13 14:17:20.759 [INFO][5172] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" Dec 13 14:17:20.764879 env[1824]: time="2024-12-13T14:17:20.764801097Z" level=info msg="TearDown network for sandbox \"d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac\" successfully" Dec 13 14:17:20.765238 env[1824]: time="2024-12-13T14:17:20.765189490Z" level=info msg="StopPodSandbox for \"d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac\" returns successfully" Dec 13 14:17:20.766246 env[1824]: time="2024-12-13T14:17:20.766141495Z" level=info msg="RemovePodSandbox for \"d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac\"" Dec 13 14:17:20.766459 env[1824]: time="2024-12-13T14:17:20.766245827Z" level=info msg="Forcibly stopping sandbox \"d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac\"" Dec 13 14:17:20.812468 systemd[1]: Started cri-containerd-e63aaa61aacdc01e07d8baaa826e864c6cded7f881a595049cde9db7080a91c2.scope. Dec 13 14:17:20.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.926000 audit: BPF prog-id=203 op=LOAD Dec 13 14:17:20.930000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.930000 audit[5216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4850 pid=5216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536336161613631616163646330316530376438626161613832366538 Dec 13 14:17:20.930000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.930000 audit[5216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4850 pid=5216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536336161613631616163646330316530376438626161613832366538 Dec 13 14:17:20.930000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.930000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.930000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.930000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.930000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.930000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.930000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.930000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.930000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.930000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.930000 audit: BPF prog-id=204 op=LOAD Dec 13 14:17:20.930000 audit[5216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4850 pid=5216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536336161613631616163646330316530376438626161613832366538 Dec 13 14:17:20.931000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.931000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.931000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.931000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.931000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.931000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.931000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.931000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.931000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.931000 audit: BPF prog-id=205 op=LOAD Dec 13 14:17:20.931000 audit[5216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4850 pid=5216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536336161613631616163646330316530376438626161613832366538 Dec 13 14:17:20.931000 audit: BPF prog-id=205 op=UNLOAD Dec 13 14:17:20.931000 audit: BPF prog-id=204 op=UNLOAD Dec 13 14:17:20.931000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.931000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.931000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.931000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.931000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.931000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.931000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.931000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.931000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.931000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.931000 audit: BPF prog-id=206 op=LOAD Dec 13 14:17:20.931000 audit[5216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4850 pid=5216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536336161613631616163646330316530376438626161613832366538 Dec 13 14:17:20.986564 kubelet[2897]: I1213 14:17:20.986439 2897 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5fbcf8bc7f-l2sq4" podStartSLOduration=31.52299004 podStartE2EDuration="38.986391668s" podCreationTimestamp="2024-12-13 14:16:42 +0000 UTC" firstStartedPulling="2024-12-13 14:17:12.814151247 +0000 UTC m=+53.793754598" lastFinishedPulling="2024-12-13 14:17:20.277552791 +0000 UTC m=+61.257156226" observedRunningTime="2024-12-13 14:17:20.986092558 +0000 UTC m=+61.965696053" watchObservedRunningTime="2024-12-13 14:17:20.986391668 +0000 UTC m=+61.965995031" Dec 13 14:17:21.050897 env[1824]: time="2024-12-13T14:17:21.050830384Z" level=info msg="StartContainer for \"e63aaa61aacdc01e07d8baaa826e864c6cded7f881a595049cde9db7080a91c2\" returns successfully" Dec 13 14:17:21.115655 env[1824]: 2024-12-13 14:17:20.907 [WARNING][5232] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--24--217-k8s-coredns--7db6d8ff4d--7rpbw-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"eaf54e69-06a6-44c4-9afc-ea6802f54674", ResourceVersion:"876", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-24-217", ContainerID:"aad0726952ffaf3e802ff4033f863176e66cc4f6046dcd88774a390a953642a8", Pod:"coredns-7db6d8ff4d-7rpbw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.49.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5fe6c36e5ca", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:21.115655 env[1824]: 2024-12-13 14:17:20.908 [INFO][5232] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" Dec 13 14:17:21.115655 env[1824]: 2024-12-13 14:17:20.908 [INFO][5232] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" iface="eth0" netns="" Dec 13 14:17:21.115655 env[1824]: 2024-12-13 14:17:20.908 [INFO][5232] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" Dec 13 14:17:21.115655 env[1824]: 2024-12-13 14:17:20.908 [INFO][5232] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" Dec 13 14:17:21.115655 env[1824]: 2024-12-13 14:17:21.062 [INFO][5247] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" HandleID="k8s-pod-network.d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" Workload="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--7rpbw-eth0" Dec 13 14:17:21.115655 env[1824]: 2024-12-13 14:17:21.063 [INFO][5247] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:21.115655 env[1824]: 2024-12-13 14:17:21.065 [INFO][5247] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:21.115655 env[1824]: 2024-12-13 14:17:21.095 [WARNING][5247] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" HandleID="k8s-pod-network.d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" Workload="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--7rpbw-eth0" Dec 13 14:17:21.115655 env[1824]: 2024-12-13 14:17:21.096 [INFO][5247] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" HandleID="k8s-pod-network.d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" Workload="ip--172--31--24--217-k8s-coredns--7db6d8ff4d--7rpbw-eth0" Dec 13 14:17:21.115655 env[1824]: 2024-12-13 14:17:21.108 [INFO][5247] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:21.115655 env[1824]: 2024-12-13 14:17:21.111 [INFO][5232] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac" Dec 13 14:17:21.116948 env[1824]: time="2024-12-13T14:17:21.116862273Z" level=info msg="TearDown network for sandbox \"d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac\" successfully" Dec 13 14:17:21.125876 env[1824]: time="2024-12-13T14:17:21.125799522Z" level=info msg="RemovePodSandbox \"d2a8684359c4cd9c4982a8dcf14e2e8c5999173bce082aedf9409b09b0485fac\" returns successfully" Dec 13 14:17:21.126795 env[1824]: time="2024-12-13T14:17:21.126739046Z" level=info msg="StopPodSandbox for \"8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187\"" Dec 13 14:17:21.187000 audit[5280]: NETFILTER_CFG table=filter:114 family=2 entries=10 op=nft_register_rule pid=5280 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:21.187000 audit[5280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffd77b8bf0 a2=0 a3=1 items=0 ppid=3062 pid=5280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:21.187000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:21.203000 audit[5280]: NETFILTER_CFG table=nat:115 family=2 entries=20 op=nft_register_rule pid=5280 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:21.203000 audit[5280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffd77b8bf0 a2=0 a3=1 items=0 ppid=3062 pid=5280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:21.203000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:21.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.24.217:22-139.178.89.65:48754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:21.332902 systemd[1]: Started sshd@10-172.31.24.217:22-139.178.89.65:48754.service. Dec 13 14:17:21.364736 env[1824]: 2024-12-13 14:17:21.250 [WARNING][5276] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--mnfv8-eth0", GenerateName:"calico-apiserver-5fbcf8bc7f-", Namespace:"calico-apiserver", SelfLink:"", UID:"f5a3f4a9-fdfd-48cb-a792-bf6570e63fbf", ResourceVersion:"868", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5fbcf8bc7f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-24-217", ContainerID:"67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1", Pod:"calico-apiserver-5fbcf8bc7f-mnfv8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.49.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali84fc5a9b2e7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:21.364736 env[1824]: 2024-12-13 14:17:21.250 [INFO][5276] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" Dec 13 14:17:21.364736 env[1824]: 2024-12-13 14:17:21.250 [INFO][5276] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" iface="eth0" netns="" Dec 13 14:17:21.364736 env[1824]: 2024-12-13 14:17:21.250 [INFO][5276] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" Dec 13 14:17:21.364736 env[1824]: 2024-12-13 14:17:21.250 [INFO][5276] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" Dec 13 14:17:21.364736 env[1824]: 2024-12-13 14:17:21.318 [INFO][5283] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" HandleID="k8s-pod-network.8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" Workload="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--mnfv8-eth0" Dec 13 14:17:21.364736 env[1824]: 2024-12-13 14:17:21.318 [INFO][5283] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:21.364736 env[1824]: 2024-12-13 14:17:21.322 [INFO][5283] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:21.364736 env[1824]: 2024-12-13 14:17:21.354 [WARNING][5283] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" HandleID="k8s-pod-network.8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" Workload="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--mnfv8-eth0" Dec 13 14:17:21.364736 env[1824]: 2024-12-13 14:17:21.354 [INFO][5283] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" HandleID="k8s-pod-network.8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" Workload="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--mnfv8-eth0" Dec 13 14:17:21.364736 env[1824]: 2024-12-13 14:17:21.357 [INFO][5283] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:21.364736 env[1824]: 2024-12-13 14:17:21.360 [INFO][5276] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" Dec 13 14:17:21.366503 env[1824]: time="2024-12-13T14:17:21.366444706Z" level=info msg="TearDown network for sandbox \"8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187\" successfully" Dec 13 14:17:21.366704 env[1824]: time="2024-12-13T14:17:21.366641789Z" level=info msg="StopPodSandbox for \"8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187\" returns successfully" Dec 13 14:17:21.368201 env[1824]: time="2024-12-13T14:17:21.367714889Z" level=info msg="RemovePodSandbox for \"8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187\"" Dec 13 14:17:21.368201 env[1824]: time="2024-12-13T14:17:21.367784575Z" level=info msg="Forcibly stopping sandbox \"8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187\"" Dec 13 14:17:21.534652 sshd[5290]: Accepted publickey for core from 139.178.89.65 port 48754 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:21.534000 audit[5290]: USER_ACCT pid=5290 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:21.536000 audit[5290]: CRED_ACQ pid=5290 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:21.537000 audit[5290]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc274f010 a2=3 a3=1 items=0 ppid=1 pid=5290 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:21.537000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:21.538968 sshd[5290]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:21.555661 systemd-logind[1805]: New session 11 of user core. Dec 13 14:17:21.556705 systemd[1]: Started session-11.scope. Dec 13 14:17:21.584000 audit[5290]: USER_START pid=5290 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:21.587000 audit[5323]: CRED_ACQ pid=5323 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:21.613820 env[1824]: 2024-12-13 14:17:21.476 [WARNING][5306] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--mnfv8-eth0", GenerateName:"calico-apiserver-5fbcf8bc7f-", Namespace:"calico-apiserver", SelfLink:"", UID:"f5a3f4a9-fdfd-48cb-a792-bf6570e63fbf", ResourceVersion:"868", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5fbcf8bc7f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-24-217", ContainerID:"67edcf05460a1d77ba32dc979ae8c9764b52a8b56a9f93d888ba15bb86b0cbe1", Pod:"calico-apiserver-5fbcf8bc7f-mnfv8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.49.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali84fc5a9b2e7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:21.613820 env[1824]: 2024-12-13 14:17:21.477 [INFO][5306] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" Dec 13 14:17:21.613820 env[1824]: 2024-12-13 14:17:21.477 [INFO][5306] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" iface="eth0" netns="" Dec 13 14:17:21.613820 env[1824]: 2024-12-13 14:17:21.477 [INFO][5306] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" Dec 13 14:17:21.613820 env[1824]: 2024-12-13 14:17:21.477 [INFO][5306] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" Dec 13 14:17:21.613820 env[1824]: 2024-12-13 14:17:21.561 [INFO][5317] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" HandleID="k8s-pod-network.8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" Workload="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--mnfv8-eth0" Dec 13 14:17:21.613820 env[1824]: 2024-12-13 14:17:21.562 [INFO][5317] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:21.613820 env[1824]: 2024-12-13 14:17:21.562 [INFO][5317] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:21.613820 env[1824]: 2024-12-13 14:17:21.594 [WARNING][5317] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" HandleID="k8s-pod-network.8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" Workload="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--mnfv8-eth0" Dec 13 14:17:21.613820 env[1824]: 2024-12-13 14:17:21.594 [INFO][5317] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" HandleID="k8s-pod-network.8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" Workload="ip--172--31--24--217-k8s-calico--apiserver--5fbcf8bc7f--mnfv8-eth0" Dec 13 14:17:21.613820 env[1824]: 2024-12-13 14:17:21.603 [INFO][5317] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:21.613820 env[1824]: 2024-12-13 14:17:21.608 [INFO][5306] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187" Dec 13 14:17:21.614879 env[1824]: time="2024-12-13T14:17:21.613852679Z" level=info msg="TearDown network for sandbox \"8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187\" successfully" Dec 13 14:17:21.631294 env[1824]: time="2024-12-13T14:17:21.631230435Z" level=info msg="RemovePodSandbox \"8209dcf3c004d4453e13266382d1db0d32199c293f350b3efa42b0e07abc0187\" returns successfully" Dec 13 14:17:21.632293 env[1824]: time="2024-12-13T14:17:21.632240988Z" level=info msg="StopPodSandbox for \"73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5\"" Dec 13 14:17:22.009831 sshd[5290]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:22.015000 audit[5290]: USER_END pid=5290 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:22.015000 audit[5290]: CRED_DISP pid=5290 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:22.018536 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 14:17:22.020260 systemd[1]: sshd@10-172.31.24.217:22-139.178.89.65:48754.service: Deactivated successfully. Dec 13 14:17:22.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.24.217:22-139.178.89.65:48754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:22.031553 systemd-logind[1805]: Session 11 logged out. Waiting for processes to exit. Dec 13 14:17:22.044186 env[1824]: 2024-12-13 14:17:21.798 [WARNING][5339] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--24--217-k8s-csi--node--driver--jcqpr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c", ResourceVersion:"844", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-24-217", ContainerID:"cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9", Pod:"csi-node-driver-jcqpr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.49.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2b659a48d0f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:22.044186 env[1824]: 2024-12-13 14:17:21.799 [INFO][5339] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" Dec 13 14:17:22.044186 env[1824]: 2024-12-13 14:17:21.799 [INFO][5339] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" iface="eth0" netns="" Dec 13 14:17:22.044186 env[1824]: 2024-12-13 14:17:21.799 [INFO][5339] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" Dec 13 14:17:22.044186 env[1824]: 2024-12-13 14:17:21.799 [INFO][5339] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" Dec 13 14:17:22.044186 env[1824]: 2024-12-13 14:17:21.940 [INFO][5353] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" HandleID="k8s-pod-network.73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" Workload="ip--172--31--24--217-k8s-csi--node--driver--jcqpr-eth0" Dec 13 14:17:22.044186 env[1824]: 2024-12-13 14:17:21.941 [INFO][5353] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:22.044186 env[1824]: 2024-12-13 14:17:21.942 [INFO][5353] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:22.044186 env[1824]: 2024-12-13 14:17:21.989 [WARNING][5353] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" HandleID="k8s-pod-network.73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" Workload="ip--172--31--24--217-k8s-csi--node--driver--jcqpr-eth0" Dec 13 14:17:22.044186 env[1824]: 2024-12-13 14:17:21.989 [INFO][5353] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" HandleID="k8s-pod-network.73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" Workload="ip--172--31--24--217-k8s-csi--node--driver--jcqpr-eth0" Dec 13 14:17:22.044186 env[1824]: 2024-12-13 14:17:21.999 [INFO][5353] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:22.044186 env[1824]: 2024-12-13 14:17:22.007 [INFO][5339] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" Dec 13 14:17:22.044186 env[1824]: time="2024-12-13T14:17:22.041795773Z" level=info msg="TearDown network for sandbox \"73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5\" successfully" Dec 13 14:17:22.044186 env[1824]: time="2024-12-13T14:17:22.041892124Z" level=info msg="StopPodSandbox for \"73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5\" returns successfully" Dec 13 14:17:22.045250 systemd[1]: Started sshd@11-172.31.24.217:22-139.178.89.65:48758.service. Dec 13 14:17:22.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.24.217:22-139.178.89.65:48758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:22.056937 systemd-logind[1805]: Removed session 11. Dec 13 14:17:22.061725 env[1824]: time="2024-12-13T14:17:22.061646613Z" level=info msg="RemovePodSandbox for \"73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5\"" Dec 13 14:17:22.061901 env[1824]: time="2024-12-13T14:17:22.061751209Z" level=info msg="Forcibly stopping sandbox \"73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5\"" Dec 13 14:17:22.065476 kubelet[2897]: I1213 14:17:22.061693 2897 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5fbcf8bc7f-mnfv8" podStartSLOduration=33.599327182 podStartE2EDuration="40.06166981s" podCreationTimestamp="2024-12-13 14:16:42 +0000 UTC" firstStartedPulling="2024-12-13 14:17:14.212424932 +0000 UTC m=+55.192028283" lastFinishedPulling="2024-12-13 14:17:20.67476756 +0000 UTC m=+61.654370911" observedRunningTime="2024-12-13 14:17:22.061448427 +0000 UTC m=+63.041051826" watchObservedRunningTime="2024-12-13 14:17:22.06166981 +0000 UTC m=+63.041273161" Dec 13 14:17:22.143000 audit[5381]: NETFILTER_CFG table=filter:116 family=2 entries=10 op=nft_register_rule pid=5381 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:22.143000 audit[5381]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffd5c49370 a2=0 a3=1 items=0 ppid=3062 pid=5381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:22.143000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:22.178000 audit[5381]: NETFILTER_CFG table=nat:117 family=2 entries=20 op=nft_register_rule pid=5381 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:22.178000 audit[5381]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffd5c49370 a2=0 a3=1 items=0 ppid=3062 pid=5381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:22.178000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:22.259000 audit[5361]: USER_ACCT pid=5361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:22.261358 sshd[5361]: Accepted publickey for core from 139.178.89.65 port 48758 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:22.262000 audit[5361]: CRED_ACQ pid=5361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:22.262000 audit[5361]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe64ea810 a2=3 a3=1 items=0 ppid=1 pid=5361 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:22.262000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:22.263324 sshd[5361]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:22.277713 systemd-logind[1805]: New session 12 of user core. Dec 13 14:17:22.279171 systemd[1]: Started session-12.scope. Dec 13 14:17:22.300000 audit[5361]: USER_START pid=5361 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:22.304000 audit[5387]: CRED_ACQ pid=5387 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:22.384413 env[1824]: 2024-12-13 14:17:22.218 [WARNING][5376] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--24--217-k8s-csi--node--driver--jcqpr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7c2a7441-2ea6-4bca-a02f-c7e1fd939a3c", ResourceVersion:"844", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-24-217", ContainerID:"cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9", Pod:"csi-node-driver-jcqpr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.49.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2b659a48d0f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:22.384413 env[1824]: 2024-12-13 14:17:22.219 [INFO][5376] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" Dec 13 14:17:22.384413 env[1824]: 2024-12-13 14:17:22.220 [INFO][5376] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" iface="eth0" netns="" Dec 13 14:17:22.384413 env[1824]: 2024-12-13 14:17:22.220 [INFO][5376] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" Dec 13 14:17:22.384413 env[1824]: 2024-12-13 14:17:22.220 [INFO][5376] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" Dec 13 14:17:22.384413 env[1824]: 2024-12-13 14:17:22.338 [INFO][5383] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" HandleID="k8s-pod-network.73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" Workload="ip--172--31--24--217-k8s-csi--node--driver--jcqpr-eth0" Dec 13 14:17:22.384413 env[1824]: 2024-12-13 14:17:22.338 [INFO][5383] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:22.384413 env[1824]: 2024-12-13 14:17:22.339 [INFO][5383] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:22.384413 env[1824]: 2024-12-13 14:17:22.367 [WARNING][5383] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" HandleID="k8s-pod-network.73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" Workload="ip--172--31--24--217-k8s-csi--node--driver--jcqpr-eth0" Dec 13 14:17:22.384413 env[1824]: 2024-12-13 14:17:22.367 [INFO][5383] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" HandleID="k8s-pod-network.73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" Workload="ip--172--31--24--217-k8s-csi--node--driver--jcqpr-eth0" Dec 13 14:17:22.384413 env[1824]: 2024-12-13 14:17:22.373 [INFO][5383] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:22.384413 env[1824]: 2024-12-13 14:17:22.376 [INFO][5376] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5" Dec 13 14:17:22.384413 env[1824]: time="2024-12-13T14:17:22.383421374Z" level=info msg="TearDown network for sandbox \"73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5\" successfully" Dec 13 14:17:22.396840 env[1824]: time="2024-12-13T14:17:22.396755523Z" level=info msg="RemovePodSandbox \"73e45d89aad53e03b1624e8c6f91d33d907199aa3cee5fc9e6195e7018bcbdd5\" returns successfully" Dec 13 14:17:22.398377 env[1824]: time="2024-12-13T14:17:22.398301389Z" level=info msg="StopPodSandbox for \"e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223\"" Dec 13 14:17:22.743948 env[1824]: 2024-12-13 14:17:22.575 [WARNING][5409] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--24--217-k8s-calico--kube--controllers--56dc846f8d--88fpd-eth0", GenerateName:"calico-kube-controllers-56dc846f8d-", Namespace:"calico-system", SelfLink:"", UID:"3fe07beb-f75f-4d6e-8ba9-f2ae93fab6db", ResourceVersion:"890", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"56dc846f8d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-24-217", ContainerID:"a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb", Pod:"calico-kube-controllers-56dc846f8d-88fpd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.49.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calidf1dcea19f6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:22.743948 env[1824]: 2024-12-13 14:17:22.576 [INFO][5409] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" Dec 13 14:17:22.743948 env[1824]: 2024-12-13 14:17:22.576 [INFO][5409] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" iface="eth0" netns="" Dec 13 14:17:22.743948 env[1824]: 2024-12-13 14:17:22.576 [INFO][5409] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" Dec 13 14:17:22.743948 env[1824]: 2024-12-13 14:17:22.576 [INFO][5409] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" Dec 13 14:17:22.743948 env[1824]: 2024-12-13 14:17:22.702 [INFO][5416] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" HandleID="k8s-pod-network.e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" Workload="ip--172--31--24--217-k8s-calico--kube--controllers--56dc846f8d--88fpd-eth0" Dec 13 14:17:22.743948 env[1824]: 2024-12-13 14:17:22.706 [INFO][5416] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:22.743948 env[1824]: 2024-12-13 14:17:22.706 [INFO][5416] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:22.743948 env[1824]: 2024-12-13 14:17:22.723 [WARNING][5416] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" HandleID="k8s-pod-network.e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" Workload="ip--172--31--24--217-k8s-calico--kube--controllers--56dc846f8d--88fpd-eth0" Dec 13 14:17:22.743948 env[1824]: 2024-12-13 14:17:22.723 [INFO][5416] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" HandleID="k8s-pod-network.e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" Workload="ip--172--31--24--217-k8s-calico--kube--controllers--56dc846f8d--88fpd-eth0" Dec 13 14:17:22.743948 env[1824]: 2024-12-13 14:17:22.735 [INFO][5416] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:22.743948 env[1824]: 2024-12-13 14:17:22.739 [INFO][5409] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" Dec 13 14:17:22.745670 env[1824]: time="2024-12-13T14:17:22.743984106Z" level=info msg="TearDown network for sandbox \"e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223\" successfully" Dec 13 14:17:22.745670 env[1824]: time="2024-12-13T14:17:22.744033415Z" level=info msg="StopPodSandbox for \"e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223\" returns successfully" Dec 13 14:17:22.746809 env[1824]: time="2024-12-13T14:17:22.746726147Z" level=info msg="RemovePodSandbox for \"e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223\"" Dec 13 14:17:22.747356 env[1824]: time="2024-12-13T14:17:22.747095231Z" level=info msg="Forcibly stopping sandbox \"e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223\"" Dec 13 14:17:22.830674 sshd[5361]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:22.834000 audit[5361]: USER_END pid=5361 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:22.834000 audit[5361]: CRED_DISP pid=5361 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:22.836617 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 14:17:22.837786 systemd[1]: sshd@11-172.31.24.217:22-139.178.89.65:48758.service: Deactivated successfully. Dec 13 14:17:22.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.24.217:22-139.178.89.65:48758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:22.841001 systemd-logind[1805]: Session 12 logged out. Waiting for processes to exit. Dec 13 14:17:22.848753 systemd-logind[1805]: Removed session 12. Dec 13 14:17:22.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.24.217:22-139.178.89.65:48766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:22.859357 systemd[1]: Started sshd@12-172.31.24.217:22-139.178.89.65:48766.service. Dec 13 14:17:23.029156 kubelet[2897]: I1213 14:17:23.023046 2897 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:17:23.062409 sshd[5444]: Accepted publickey for core from 139.178.89.65 port 48766 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:23.061000 audit[5444]: USER_ACCT pid=5444 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:23.064000 audit[5444]: CRED_ACQ pid=5444 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:23.064000 audit[5444]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc53e1530 a2=3 a3=1 items=0 ppid=1 pid=5444 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:23.064000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:23.066098 sshd[5444]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:23.080878 systemd-logind[1805]: New session 13 of user core. Dec 13 14:17:23.082332 systemd[1]: Started session-13.scope. Dec 13 14:17:23.108000 audit[5444]: USER_START pid=5444 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:23.112000 audit[5453]: CRED_ACQ pid=5453 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:23.122241 env[1824]: 2024-12-13 14:17:22.934 [WARNING][5436] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--24--217-k8s-calico--kube--controllers--56dc846f8d--88fpd-eth0", GenerateName:"calico-kube-controllers-56dc846f8d-", Namespace:"calico-system", SelfLink:"", UID:"3fe07beb-f75f-4d6e-8ba9-f2ae93fab6db", ResourceVersion:"890", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"56dc846f8d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-24-217", ContainerID:"a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb", Pod:"calico-kube-controllers-56dc846f8d-88fpd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.49.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calidf1dcea19f6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:23.122241 env[1824]: 2024-12-13 14:17:22.934 [INFO][5436] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" Dec 13 14:17:23.122241 env[1824]: 2024-12-13 14:17:22.934 [INFO][5436] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" iface="eth0" netns="" Dec 13 14:17:23.122241 env[1824]: 2024-12-13 14:17:22.934 [INFO][5436] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" Dec 13 14:17:23.122241 env[1824]: 2024-12-13 14:17:22.935 [INFO][5436] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" Dec 13 14:17:23.122241 env[1824]: 2024-12-13 14:17:23.045 [INFO][5446] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" HandleID="k8s-pod-network.e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" Workload="ip--172--31--24--217-k8s-calico--kube--controllers--56dc846f8d--88fpd-eth0" Dec 13 14:17:23.122241 env[1824]: 2024-12-13 14:17:23.045 [INFO][5446] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:23.122241 env[1824]: 2024-12-13 14:17:23.045 [INFO][5446] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:23.122241 env[1824]: 2024-12-13 14:17:23.093 [WARNING][5446] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" HandleID="k8s-pod-network.e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" Workload="ip--172--31--24--217-k8s-calico--kube--controllers--56dc846f8d--88fpd-eth0" Dec 13 14:17:23.122241 env[1824]: 2024-12-13 14:17:23.095 [INFO][5446] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" HandleID="k8s-pod-network.e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" Workload="ip--172--31--24--217-k8s-calico--kube--controllers--56dc846f8d--88fpd-eth0" Dec 13 14:17:23.122241 env[1824]: 2024-12-13 14:17:23.112 [INFO][5446] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:23.122241 env[1824]: 2024-12-13 14:17:23.119 [INFO][5436] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223" Dec 13 14:17:23.123430 env[1824]: time="2024-12-13T14:17:23.123358544Z" level=info msg="TearDown network for sandbox \"e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223\" successfully" Dec 13 14:17:23.132906 env[1824]: time="2024-12-13T14:17:23.132596256Z" level=info msg="RemovePodSandbox \"e82d17603da8fd9ec4ccbfdf973fd75d7b43da027c11b57f85187d4031d06223\" returns successfully" Dec 13 14:17:23.449987 sshd[5444]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:23.452000 audit[5444]: USER_END pid=5444 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:23.452000 audit[5444]: CRED_DISP pid=5444 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:23.455696 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 14:17:23.456949 systemd[1]: sshd@12-172.31.24.217:22-139.178.89.65:48766.service: Deactivated successfully. Dec 13 14:17:23.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.24.217:22-139.178.89.65:48766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:23.459584 systemd-logind[1805]: Session 13 logged out. Waiting for processes to exit. Dec 13 14:17:23.462967 systemd-logind[1805]: Removed session 13. Dec 13 14:17:24.556000 audit[5178]: AVC avc: denied { watch } for pid=5178 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_16_56.709204984/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c346,c562 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c346,c562 tclass=file permissive=0 Dec 13 14:17:24.556000 audit[5178]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000347f40 a2=fc6 a3=0 items=0 ppid=4622 pid=5178 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c346,c562 key=(null) Dec 13 14:17:24.556000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:17:24.945000 audit[5464]: NETFILTER_CFG table=filter:118 family=2 entries=9 op=nft_register_rule pid=5464 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:24.945000 audit[5464]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffff5cfb730 a2=0 a3=1 items=0 ppid=3062 pid=5464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:24.945000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:24.961000 audit[5464]: NETFILTER_CFG table=nat:119 family=2 entries=27 op=nft_register_chain pid=5464 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:24.961000 audit[5464]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=fffff5cfb730 a2=0 a3=1 items=0 ppid=3062 pid=5464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:24.961000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:25.218436 env[1824]: time="2024-12-13T14:17:25.218277255Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:25.225788 env[1824]: time="2024-12-13T14:17:25.225728050Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:32c335fdb9d757e7ba6a76a9cfa8d292a5a229101ae7ea37b42f53c28adf2db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:25.230970 env[1824]: time="2024-12-13T14:17:25.230910226Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:25.236208 env[1824]: time="2024-12-13T14:17:25.236148527Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:25.239218 env[1824]: time="2024-12-13T14:17:25.237868995Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:32c335fdb9d757e7ba6a76a9cfa8d292a5a229101ae7ea37b42f53c28adf2db1\"" Dec 13 14:17:25.256170 env[1824]: time="2024-12-13T14:17:25.256094410Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:17:25.275370 env[1824]: time="2024-12-13T14:17:25.275147358Z" level=info msg="CreateContainer within sandbox \"a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:17:25.307339 env[1824]: time="2024-12-13T14:17:25.307274314Z" level=info msg="CreateContainer within sandbox \"a7a277c99af489c8d7e13e53f01f603a06770df60127355e0d2910ef31ebc5eb\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"74f63f35032d795d5e97e52ecc429652693ae5b4fd5bc49a4225b2186ab929c9\"" Dec 13 14:17:25.308648 env[1824]: time="2024-12-13T14:17:25.308589866Z" level=info msg="StartContainer for \"74f63f35032d795d5e97e52ecc429652693ae5b4fd5bc49a4225b2186ab929c9\"" Dec 13 14:17:25.363462 systemd[1]: Started cri-containerd-74f63f35032d795d5e97e52ecc429652693ae5b4fd5bc49a4225b2186ab929c9.scope. Dec 13 14:17:25.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.475000 audit: BPF prog-id=207 op=LOAD Dec 13 14:17:25.476000 audit[5474]: AVC avc: denied { bpf } for pid=5474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.476000 audit[5474]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4934 pid=5474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:25.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734663633663335303332643739356435653937653532656363343239 Dec 13 14:17:25.477000 audit[5474]: AVC avc: denied { perfmon } for pid=5474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.477000 audit[5474]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4934 pid=5474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:25.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734663633663335303332643739356435653937653532656363343239 Dec 13 14:17:25.477000 audit[5474]: AVC avc: denied { bpf } for pid=5474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.477000 audit[5474]: AVC avc: denied { bpf } for pid=5474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.477000 audit[5474]: AVC avc: denied { bpf } for pid=5474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.477000 audit[5474]: AVC avc: denied { perfmon } for pid=5474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.477000 audit[5474]: AVC avc: denied { perfmon } for pid=5474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.477000 audit[5474]: AVC avc: denied { perfmon } for pid=5474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.477000 audit[5474]: AVC avc: denied { perfmon } for pid=5474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.477000 audit[5474]: AVC avc: denied { perfmon } for pid=5474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.477000 audit[5474]: AVC avc: denied { bpf } for pid=5474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.477000 audit[5474]: AVC avc: denied { bpf } for pid=5474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.477000 audit: BPF prog-id=208 op=LOAD Dec 13 14:17:25.477000 audit[5474]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4934 pid=5474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:25.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734663633663335303332643739356435653937653532656363343239 Dec 13 14:17:25.478000 audit[5474]: AVC avc: denied { bpf } for pid=5474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.478000 audit[5474]: AVC avc: denied { bpf } for pid=5474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.478000 audit[5474]: AVC avc: denied { perfmon } for pid=5474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.478000 audit[5474]: AVC avc: denied { perfmon } for pid=5474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.478000 audit[5474]: AVC avc: denied { perfmon } for pid=5474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.478000 audit[5474]: AVC avc: denied { perfmon } for pid=5474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.478000 audit[5474]: AVC avc: denied { perfmon } for pid=5474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.478000 audit[5474]: AVC avc: denied { bpf } for pid=5474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.478000 audit[5474]: AVC avc: denied { bpf } for pid=5474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.478000 audit: BPF prog-id=209 op=LOAD Dec 13 14:17:25.478000 audit[5474]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4934 pid=5474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:25.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734663633663335303332643739356435653937653532656363343239 Dec 13 14:17:25.478000 audit: BPF prog-id=209 op=UNLOAD Dec 13 14:17:25.478000 audit: BPF prog-id=208 op=UNLOAD Dec 13 14:17:25.478000 audit[5474]: AVC avc: denied { bpf } for pid=5474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.478000 audit[5474]: AVC avc: denied { bpf } for pid=5474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.478000 audit[5474]: AVC avc: denied { bpf } for pid=5474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.478000 audit[5474]: AVC avc: denied { perfmon } for pid=5474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.478000 audit[5474]: AVC avc: denied { perfmon } for pid=5474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.478000 audit[5474]: AVC avc: denied { perfmon } for pid=5474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.478000 audit[5474]: AVC avc: denied { perfmon } for pid=5474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.478000 audit[5474]: AVC avc: denied { perfmon } for pid=5474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.478000 audit[5474]: AVC avc: denied { bpf } for pid=5474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.478000 audit[5474]: AVC avc: denied { bpf } for pid=5474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.478000 audit: BPF prog-id=210 op=LOAD Dec 13 14:17:25.478000 audit[5474]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4934 pid=5474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:25.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734663633663335303332643739356435653937653532656363343239 Dec 13 14:17:25.621065 env[1824]: time="2024-12-13T14:17:25.620978479Z" level=info msg="StartContainer for \"74f63f35032d795d5e97e52ecc429652693ae5b4fd5bc49a4225b2186ab929c9\" returns successfully" Dec 13 14:17:26.178000 audit[5238]: AVC avc: denied { watch } for pid=5238 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_16_56.1316631105/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c386 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c146,c386 tclass=file permissive=0 Dec 13 14:17:26.181824 kernel: kauditd_printk_skb: 215 callbacks suppressed Dec 13 14:17:26.181916 kernel: audit: type=1400 audit(1734099446.178:1412): avc: denied { watch } for pid=5238 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_16_56.1316631105/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c386 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c146,c386 tclass=file permissive=0 Dec 13 14:17:26.178000 audit[5238]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000e2eb40 a2=fc6 a3=0 items=0 ppid=4850 pid=5238 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c386 key=(null) Dec 13 14:17:26.209901 kernel: audit: type=1300 audit(1734099446.178:1412): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000e2eb40 a2=fc6 a3=0 items=0 ppid=4850 pid=5238 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c386 key=(null) Dec 13 14:17:26.178000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:17:26.224408 kernel: audit: type=1327 audit(1734099446.178:1412): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:17:26.224571 kubelet[2897]: I1213 14:17:26.223221 2897 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-56dc846f8d-88fpd" podStartSLOduration=33.609362574 podStartE2EDuration="44.223168674s" podCreationTimestamp="2024-12-13 14:16:42 +0000 UTC" firstStartedPulling="2024-12-13 14:17:14.626977698 +0000 UTC m=+55.606581037" lastFinishedPulling="2024-12-13 14:17:25.240783702 +0000 UTC m=+66.220387137" observedRunningTime="2024-12-13 14:17:26.085627899 +0000 UTC m=+67.065231262" watchObservedRunningTime="2024-12-13 14:17:26.223168674 +0000 UTC m=+67.202772061" Dec 13 14:17:27.018753 env[1824]: time="2024-12-13T14:17:27.018664001Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:27.023695 env[1824]: time="2024-12-13T14:17:27.023577073Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:27.028307 env[1824]: time="2024-12-13T14:17:27.028218170Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:27.032654 env[1824]: time="2024-12-13T14:17:27.032583630Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:27.035363 env[1824]: time="2024-12-13T14:17:27.034100293Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349\"" Dec 13 14:17:27.040268 env[1824]: time="2024-12-13T14:17:27.039839469Z" level=info msg="CreateContainer within sandbox \"cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:17:27.074810 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3107249623.mount: Deactivated successfully. Dec 13 14:17:27.083747 env[1824]: time="2024-12-13T14:17:27.083644702Z" level=info msg="CreateContainer within sandbox \"cbdef63eab36832fdfa01cf80c0fca54ceebf5a20e2c104f531fe8af3bf826f9\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"511a4039ea86b7edc9766e73bf7b27bb3119dc7ed3bf204b340e045e61d189f2\"" Dec 13 14:17:27.086003 env[1824]: time="2024-12-13T14:17:27.085805592Z" level=info msg="StartContainer for \"511a4039ea86b7edc9766e73bf7b27bb3119dc7ed3bf204b340e045e61d189f2\"" Dec 13 14:17:27.157484 systemd[1]: Started cri-containerd-511a4039ea86b7edc9766e73bf7b27bb3119dc7ed3bf204b340e045e61d189f2.scope. Dec 13 14:17:27.225000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.245399 kernel: audit: type=1400 audit(1734099447.225:1413): avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.245573 kernel: audit: type=1300 audit(1734099447.225:1413): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=4563 pid=5546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.225000 audit[5546]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=4563 pid=5546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531316134303339656138366237656463393736366537336266376232 Dec 13 14:17:27.246143 kernel: audit: type=1327 audit(1734099447.225:1413): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531316134303339656138366237656463393736366537336266376232 Dec 13 14:17:27.225000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.267689 kernel: audit: type=1400 audit(1734099447.225:1414): avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.267852 kernel: audit: type=1400 audit(1734099447.225:1414): avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.225000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.267302 systemd[1]: run-containerd-runc-k8s.io-511a4039ea86b7edc9766e73bf7b27bb3119dc7ed3bf204b340e045e61d189f2-runc.k73VCB.mount: Deactivated successfully. Dec 13 14:17:27.225000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.283037 kernel: audit: type=1400 audit(1734099447.225:1414): avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.225000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.294866 kernel: audit: type=1400 audit(1734099447.225:1414): avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.225000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.225000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.225000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.225000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.225000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.225000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.225000 audit: BPF prog-id=211 op=LOAD Dec 13 14:17:27.225000 audit[5546]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=4563 pid=5546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531316134303339656138366237656463393736366537336266376232 Dec 13 14:17:27.233000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.233000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.233000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.233000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.233000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.233000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.233000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.233000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.233000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.233000 audit: BPF prog-id=212 op=LOAD Dec 13 14:17:27.233000 audit[5546]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=4563 pid=5546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531316134303339656138366237656463393736366537336266376232 Dec 13 14:17:27.233000 audit: BPF prog-id=212 op=UNLOAD Dec 13 14:17:27.233000 audit: BPF prog-id=211 op=UNLOAD Dec 13 14:17:27.233000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.233000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.233000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.233000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.233000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.233000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.233000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.233000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.233000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.233000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:27.233000 audit: BPF prog-id=213 op=LOAD Dec 13 14:17:27.233000 audit[5546]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=4563 pid=5546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531316134303339656138366237656463393736366537336266376232 Dec 13 14:17:27.312982 env[1824]: time="2024-12-13T14:17:27.312914360Z" level=info msg="StartContainer for \"511a4039ea86b7edc9766e73bf7b27bb3119dc7ed3bf204b340e045e61d189f2\" returns successfully" Dec 13 14:17:27.517000 audit[2762]: AVC avc: denied { watch } for pid=2762 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:27.517000 audit[2762]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001a445a0 a2=fc6 a3=0 items=0 ppid=2530 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:17:27.517000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:17:27.518000 audit[2762]: AVC avc: denied { watch } for pid=2762 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:27.518000 audit[2762]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001a445c0 a2=fc6 a3=0 items=0 ppid=2530 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:17:27.518000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:17:27.521000 audit[2762]: AVC avc: denied { watch } for pid=2762 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:27.521000 audit[2762]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001a44760 a2=fc6 a3=0 items=0 ppid=2530 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:17:27.521000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:17:27.524000 audit[2762]: AVC avc: denied { watch } for pid=2762 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:27.524000 audit[2762]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001a44780 a2=fc6 a3=0 items=0 ppid=2530 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:17:27.524000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:17:27.558492 kubelet[2897]: I1213 14:17:27.558327 2897 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:17:27.558492 kubelet[2897]: I1213 14:17:27.558420 2897 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:17:28.482475 systemd[1]: Started sshd@13-172.31.24.217:22-139.178.89.65:56182.service. Dec 13 14:17:28.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.24.217:22-139.178.89.65:56182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:28.668000 audit[5583]: USER_ACCT pid=5583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:28.670385 sshd[5583]: Accepted publickey for core from 139.178.89.65 port 56182 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:28.671000 audit[5583]: CRED_ACQ pid=5583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:28.671000 audit[5583]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe28c2850 a2=3 a3=1 items=0 ppid=1 pid=5583 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:28.671000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:28.674780 sshd[5583]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:28.685294 systemd-logind[1805]: New session 14 of user core. Dec 13 14:17:28.692723 systemd[1]: Started session-14.scope. Dec 13 14:17:28.706000 audit[5583]: USER_START pid=5583 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:28.709000 audit[5585]: CRED_ACQ pid=5585 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:28.976755 sshd[5583]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:28.977000 audit[5583]: USER_END pid=5583 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:28.978000 audit[5583]: CRED_DISP pid=5583 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:28.983694 systemd-logind[1805]: Session 14 logged out. Waiting for processes to exit. Dec 13 14:17:28.984373 systemd[1]: sshd@13-172.31.24.217:22-139.178.89.65:56182.service: Deactivated successfully. Dec 13 14:17:28.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.24.217:22-139.178.89.65:56182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:28.986407 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 14:17:28.988584 systemd-logind[1805]: Removed session 14. Dec 13 14:17:30.139701 systemd[1]: run-containerd-runc-k8s.io-ba32901cf72a70b3cd1512697fbe4db89aaed9248d9e0a2c225edb89bdc0281e-runc.QqJfeJ.mount: Deactivated successfully. Dec 13 14:17:34.008956 systemd[1]: Started sshd@14-172.31.24.217:22-139.178.89.65:56188.service. Dec 13 14:17:34.021216 kernel: kauditd_printk_skb: 59 callbacks suppressed Dec 13 14:17:34.021404 kernel: audit: type=1130 audit(1734099454.009:1432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.24.217:22-139.178.89.65:56188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:34.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.24.217:22-139.178.89.65:56188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:34.188000 audit[5625]: USER_ACCT pid=5625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:34.190319 sshd[5625]: Accepted publickey for core from 139.178.89.65 port 56188 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:34.194679 sshd[5625]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:34.191000 audit[5625]: CRED_ACQ pid=5625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:34.209680 kernel: audit: type=1101 audit(1734099454.188:1433): pid=5625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:34.209863 kernel: audit: type=1103 audit(1734099454.191:1434): pid=5625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:34.213745 kernel: audit: type=1006 audit(1734099454.192:1435): pid=5625 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 14:17:34.192000 audit[5625]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3a2fcf0 a2=3 a3=1 items=0 ppid=1 pid=5625 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:34.226623 kernel: audit: type=1300 audit(1734099454.192:1435): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3a2fcf0 a2=3 a3=1 items=0 ppid=1 pid=5625 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:34.192000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:34.231405 kernel: audit: type=1327 audit(1734099454.192:1435): proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:34.235007 systemd-logind[1805]: New session 15 of user core. Dec 13 14:17:34.238856 systemd[1]: Started session-15.scope. Dec 13 14:17:34.251000 audit[5625]: USER_START pid=5625 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:34.255000 audit[5627]: CRED_ACQ pid=5627 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:34.272529 kernel: audit: type=1105 audit(1734099454.251:1436): pid=5625 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:34.272910 kernel: audit: type=1103 audit(1734099454.255:1437): pid=5627 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:34.523236 sshd[5625]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:34.526000 audit[5625]: USER_END pid=5625 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:34.530678 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 14:17:34.532451 systemd[1]: sshd@14-172.31.24.217:22-139.178.89.65:56188.service: Deactivated successfully. Dec 13 14:17:34.541793 systemd-logind[1805]: Session 15 logged out. Waiting for processes to exit. Dec 13 14:17:34.542262 kernel: audit: type=1106 audit(1734099454.526:1438): pid=5625 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:34.526000 audit[5625]: CRED_DISP pid=5625 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:34.553235 kernel: audit: type=1104 audit(1734099454.526:1439): pid=5625 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:34.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.24.217:22-139.178.89.65:56188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:34.554536 systemd-logind[1805]: Removed session 15. Dec 13 14:17:39.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.24.217:22-139.178.89.65:35058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:39.554481 systemd[1]: Started sshd@15-172.31.24.217:22-139.178.89.65:35058.service. Dec 13 14:17:39.557241 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:17:39.557361 kernel: audit: type=1130 audit(1734099459.553:1441): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.24.217:22-139.178.89.65:35058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:39.737000 audit[5639]: USER_ACCT pid=5639 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:39.739364 sshd[5639]: Accepted publickey for core from 139.178.89.65 port 35058 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:39.750220 kernel: audit: type=1101 audit(1734099459.737:1442): pid=5639 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:39.750000 audit[5639]: CRED_ACQ pid=5639 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:39.752669 sshd[5639]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:39.761221 kernel: audit: type=1103 audit(1734099459.750:1443): pid=5639 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:39.750000 audit[5639]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff4dcf4e0 a2=3 a3=1 items=0 ppid=1 pid=5639 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:39.778881 kernel: audit: type=1006 audit(1734099459.750:1444): pid=5639 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 14:17:39.779079 kernel: audit: type=1300 audit(1734099459.750:1444): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff4dcf4e0 a2=3 a3=1 items=0 ppid=1 pid=5639 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:39.750000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:39.783991 kernel: audit: type=1327 audit(1734099459.750:1444): proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:39.788805 systemd-logind[1805]: New session 16 of user core. Dec 13 14:17:39.790967 systemd[1]: Started session-16.scope. Dec 13 14:17:39.800000 audit[5639]: USER_START pid=5639 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:39.803000 audit[5641]: CRED_ACQ pid=5641 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:39.820803 kernel: audit: type=1105 audit(1734099459.800:1445): pid=5639 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:39.821190 kernel: audit: type=1103 audit(1734099459.803:1446): pid=5641 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:40.055823 sshd[5639]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:40.059000 audit[5639]: USER_END pid=5639 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:40.063212 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 14:17:40.064412 systemd[1]: sshd@15-172.31.24.217:22-139.178.89.65:35058.service: Deactivated successfully. Dec 13 14:17:40.068523 systemd-logind[1805]: Session 16 logged out. Waiting for processes to exit. Dec 13 14:17:40.070626 systemd-logind[1805]: Removed session 16. Dec 13 14:17:40.059000 audit[5639]: CRED_DISP pid=5639 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:40.082794 kernel: audit: type=1106 audit(1734099460.059:1447): pid=5639 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:40.083014 kernel: audit: type=1104 audit(1734099460.059:1448): pid=5639 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:40.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.24.217:22-139.178.89.65:35058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:45.093370 systemd[1]: Started sshd@16-172.31.24.217:22-139.178.89.65:35064.service. Dec 13 14:17:45.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.24.217:22-139.178.89.65:35064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:45.096245 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:17:45.096408 kernel: audit: type=1130 audit(1734099465.092:1450): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.24.217:22-139.178.89.65:35064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:45.264000 audit[5654]: USER_ACCT pid=5654 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:45.266407 sshd[5654]: Accepted publickey for core from 139.178.89.65 port 35064 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:45.277257 kernel: audit: type=1101 audit(1734099465.264:1451): pid=5654 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:45.278722 sshd[5654]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:45.276000 audit[5654]: CRED_ACQ pid=5654 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:45.290315 kernel: audit: type=1103 audit(1734099465.276:1452): pid=5654 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:45.276000 audit[5654]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff65d3260 a2=3 a3=1 items=0 ppid=1 pid=5654 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:45.297840 kernel: audit: type=1006 audit(1734099465.276:1453): pid=5654 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 14:17:45.276000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:45.311802 kernel: audit: type=1300 audit(1734099465.276:1453): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff65d3260 a2=3 a3=1 items=0 ppid=1 pid=5654 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:45.311952 kernel: audit: type=1327 audit(1734099465.276:1453): proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:45.314564 systemd-logind[1805]: New session 17 of user core. Dec 13 14:17:45.315694 systemd[1]: Started session-17.scope. Dec 13 14:17:45.324000 audit[5654]: USER_START pid=5654 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:45.340000 audit[5656]: CRED_ACQ pid=5656 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:45.354427 kernel: audit: type=1105 audit(1734099465.324:1454): pid=5654 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:45.354692 kernel: audit: type=1103 audit(1734099465.340:1455): pid=5656 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:45.684273 sshd[5654]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:45.689000 audit[5654]: USER_END pid=5654 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:45.705000 audit[5654]: CRED_DISP pid=5654 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:45.722700 kernel: audit: type=1106 audit(1734099465.689:1456): pid=5654 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:45.723293 kernel: audit: type=1104 audit(1734099465.705:1457): pid=5654 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:45.730215 systemd[1]: Started sshd@17-172.31.24.217:22-139.178.89.65:35066.service. Dec 13 14:17:45.735648 systemd[1]: sshd@16-172.31.24.217:22-139.178.89.65:35064.service: Deactivated successfully. Dec 13 14:17:45.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.24.217:22-139.178.89.65:35066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:45.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.24.217:22-139.178.89.65:35064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:45.745622 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 14:17:45.758296 systemd-logind[1805]: Session 17 logged out. Waiting for processes to exit. Dec 13 14:17:45.766792 systemd-logind[1805]: Removed session 17. Dec 13 14:17:45.935000 audit[5665]: USER_ACCT pid=5665 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:45.937397 sshd[5665]: Accepted publickey for core from 139.178.89.65 port 35066 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:45.941000 audit[5665]: CRED_ACQ pid=5665 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:45.942000 audit[5665]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffc9e5620 a2=3 a3=1 items=0 ppid=1 pid=5665 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:45.942000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:45.944821 sshd[5665]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:45.962240 systemd-logind[1805]: New session 18 of user core. Dec 13 14:17:45.963903 systemd[1]: Started session-18.scope. Dec 13 14:17:45.985000 audit[5665]: USER_START pid=5665 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:45.990000 audit[5668]: CRED_ACQ pid=5668 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:46.557528 sshd[5665]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:46.558000 audit[5665]: USER_END pid=5665 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:46.559000 audit[5665]: CRED_DISP pid=5665 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:46.562790 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 14:17:46.564906 systemd-logind[1805]: Session 18 logged out. Waiting for processes to exit. Dec 13 14:17:46.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.24.217:22-139.178.89.65:35066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:46.565533 systemd[1]: sshd@17-172.31.24.217:22-139.178.89.65:35066.service: Deactivated successfully. Dec 13 14:17:46.569924 systemd-logind[1805]: Removed session 18. Dec 13 14:17:46.591918 systemd[1]: Started sshd@18-172.31.24.217:22-139.178.89.65:35072.service. Dec 13 14:17:46.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.24.217:22-139.178.89.65:35072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:46.782713 sshd[5678]: Accepted publickey for core from 139.178.89.65 port 35072 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:46.781000 audit[5678]: USER_ACCT pid=5678 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:46.784000 audit[5678]: CRED_ACQ pid=5678 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:46.784000 audit[5678]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe9f0d9b0 a2=3 a3=1 items=0 ppid=1 pid=5678 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:46.784000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:46.786491 sshd[5678]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:46.797613 systemd[1]: Started session-19.scope. Dec 13 14:17:46.800244 systemd-logind[1805]: New session 19 of user core. Dec 13 14:17:46.815000 audit[5678]: USER_START pid=5678 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:46.819000 audit[5680]: CRED_ACQ pid=5680 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:50.795000 audit[5696]: NETFILTER_CFG table=filter:120 family=2 entries=20 op=nft_register_rule pid=5696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:50.801231 kernel: kauditd_printk_skb: 20 callbacks suppressed Dec 13 14:17:50.801401 kernel: audit: type=1325 audit(1734099470.795:1474): table=filter:120 family=2 entries=20 op=nft_register_rule pid=5696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:50.795000 audit[5696]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffc55ac470 a2=0 a3=1 items=0 ppid=3062 pid=5696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.795000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:50.836360 kernel: audit: type=1300 audit(1734099470.795:1474): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffc55ac470 a2=0 a3=1 items=0 ppid=3062 pid=5696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.836524 kernel: audit: type=1327 audit(1734099470.795:1474): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:50.836746 kernel: audit: type=1325 audit(1734099470.816:1475): table=nat:121 family=2 entries=22 op=nft_register_rule pid=5696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:50.816000 audit[5696]: NETFILTER_CFG table=nat:121 family=2 entries=22 op=nft_register_rule pid=5696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:50.816000 audit[5696]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffc55ac470 a2=0 a3=1 items=0 ppid=3062 pid=5696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.854407 kernel: audit: type=1300 audit(1734099470.816:1475): arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffc55ac470 a2=0 a3=1 items=0 ppid=3062 pid=5696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.856421 sshd[5678]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:50.816000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:50.867274 kernel: audit: type=1327 audit(1734099470.816:1475): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:50.868610 systemd[1]: sshd@18-172.31.24.217:22-139.178.89.65:35072.service: Deactivated successfully. Dec 13 14:17:50.871499 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 14:17:50.872066 systemd[1]: session-19.scope: Consumed 1.200s CPU time. Dec 13 14:17:50.874855 systemd-logind[1805]: Session 19 logged out. Waiting for processes to exit. Dec 13 14:17:50.858000 audit[5678]: USER_END pid=5678 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:50.888780 kernel: audit: type=1106 audit(1734099470.858:1476): pid=5678 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:50.906194 systemd[1]: Started sshd@19-172.31.24.217:22-139.178.89.65:43466.service. Dec 13 14:17:50.859000 audit[5678]: CRED_DISP pid=5678 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:50.922543 kernel: audit: type=1104 audit(1734099470.859:1477): pid=5678 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:50.922732 systemd-logind[1805]: Removed session 19. Dec 13 14:17:50.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.24.217:22-139.178.89.65:35072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:50.936585 kernel: audit: type=1131 audit(1734099470.868:1478): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.24.217:22-139.178.89.65:35072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:50.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.24.217:22-139.178.89.65:43466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:50.949648 kernel: audit: type=1130 audit(1734099470.905:1479): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.24.217:22-139.178.89.65:43466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:50.964000 audit[5698]: NETFILTER_CFG table=filter:122 family=2 entries=32 op=nft_register_rule pid=5698 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:50.964000 audit[5698]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffff2d01c40 a2=0 a3=1 items=0 ppid=3062 pid=5698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.964000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:50.969000 audit[5698]: NETFILTER_CFG table=nat:123 family=2 entries=22 op=nft_register_rule pid=5698 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:50.969000 audit[5698]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff2d01c40 a2=0 a3=1 items=0 ppid=3062 pid=5698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:50.969000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:51.114000 audit[5701]: USER_ACCT pid=5701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:51.116588 sshd[5701]: Accepted publickey for core from 139.178.89.65 port 43466 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:51.118000 audit[5701]: CRED_ACQ pid=5701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:51.118000 audit[5701]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff88ee1e0 a2=3 a3=1 items=0 ppid=1 pid=5701 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.118000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:51.120833 sshd[5701]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:51.133476 systemd[1]: Started session-20.scope. Dec 13 14:17:51.134448 systemd-logind[1805]: New session 20 of user core. Dec 13 14:17:51.147000 audit[5701]: USER_START pid=5701 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:51.150000 audit[5703]: CRED_ACQ pid=5703 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:51.355276 kubelet[2897]: I1213 14:17:51.355220 2897 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:17:51.431568 kubelet[2897]: I1213 14:17:51.431347 2897 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-jcqpr" podStartSLOduration=54.904145367 podStartE2EDuration="1m9.431322073s" podCreationTimestamp="2024-12-13 14:16:42 +0000 UTC" firstStartedPulling="2024-12-13 14:17:12.509667538 +0000 UTC m=+53.489270889" lastFinishedPulling="2024-12-13 14:17:27.036844244 +0000 UTC m=+68.016447595" observedRunningTime="2024-12-13 14:17:28.084552431 +0000 UTC m=+69.064155782" watchObservedRunningTime="2024-12-13 14:17:51.431322073 +0000 UTC m=+92.410925436" Dec 13 14:17:51.753805 sshd[5701]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:51.756000 audit[5701]: USER_END pid=5701 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:51.756000 audit[5701]: CRED_DISP pid=5701 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:51.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.24.217:22-139.178.89.65:43466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:51.760508 systemd[1]: sshd@19-172.31.24.217:22-139.178.89.65:43466.service: Deactivated successfully. Dec 13 14:17:51.761941 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 14:17:51.764815 systemd-logind[1805]: Session 20 logged out. Waiting for processes to exit. Dec 13 14:17:51.767688 systemd-logind[1805]: Removed session 20. Dec 13 14:17:51.785796 systemd[1]: Started sshd@20-172.31.24.217:22-139.178.89.65:43478.service. Dec 13 14:17:51.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.24.217:22-139.178.89.65:43478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:51.966000 audit[5711]: USER_ACCT pid=5711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:51.969218 sshd[5711]: Accepted publickey for core from 139.178.89.65 port 43478 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:51.969000 audit[5711]: CRED_ACQ pid=5711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:51.969000 audit[5711]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdfdafd40 a2=3 a3=1 items=0 ppid=1 pid=5711 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:51.969000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:51.971858 sshd[5711]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:51.981422 systemd-logind[1805]: New session 21 of user core. Dec 13 14:17:51.982755 systemd[1]: Started session-21.scope. Dec 13 14:17:51.998000 audit[5711]: USER_START pid=5711 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:52.002000 audit[5714]: CRED_ACQ pid=5714 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:52.006000 audit[5715]: NETFILTER_CFG table=filter:124 family=2 entries=32 op=nft_register_rule pid=5715 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:52.006000 audit[5715]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffd56ac7a0 a2=0 a3=1 items=0 ppid=3062 pid=5715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:52.006000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:52.018000 audit[5715]: NETFILTER_CFG table=nat:125 family=2 entries=34 op=nft_register_chain pid=5715 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:52.018000 audit[5715]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffd56ac7a0 a2=0 a3=1 items=0 ppid=3062 pid=5715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:52.018000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:52.264440 sshd[5711]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:52.265000 audit[5711]: USER_END pid=5711 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:52.266000 audit[5711]: CRED_DISP pid=5711 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:52.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.24.217:22-139.178.89.65:43478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:52.269802 systemd-logind[1805]: Session 21 logged out. Waiting for processes to exit. Dec 13 14:17:52.270496 systemd[1]: sshd@20-172.31.24.217:22-139.178.89.65:43478.service: Deactivated successfully. Dec 13 14:17:52.271923 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 14:17:52.277333 systemd-logind[1805]: Removed session 21. Dec 13 14:17:54.418545 amazon-ssm-agent[1792]: 2024-12-13 14:17:54 INFO [HealthCheck] HealthCheck reporting agent health. Dec 13 14:17:56.120154 systemd[1]: run-containerd-runc-k8s.io-74f63f35032d795d5e97e52ecc429652693ae5b4fd5bc49a4225b2186ab929c9-runc.w3wlxx.mount: Deactivated successfully. Dec 13 14:17:57.309050 kernel: kauditd_printk_skb: 33 callbacks suppressed Dec 13 14:17:57.309232 kernel: audit: type=1130 audit(1734099477.297:1501): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.24.217:22-139.178.89.65:43486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:57.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.24.217:22-139.178.89.65:43486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:57.298150 systemd[1]: Started sshd@21-172.31.24.217:22-139.178.89.65:43486.service. Dec 13 14:17:57.480000 audit[5749]: USER_ACCT pid=5749 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:57.484704 sshd[5749]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:57.487399 sshd[5749]: Accepted publickey for core from 139.178.89.65 port 43486 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:57.482000 audit[5749]: CRED_ACQ pid=5749 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:57.501472 kernel: audit: type=1101 audit(1734099477.480:1502): pid=5749 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:57.501860 kernel: audit: type=1103 audit(1734099477.482:1503): pid=5749 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:57.501992 kernel: audit: type=1006 audit(1734099477.482:1504): pid=5749 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Dec 13 14:17:57.482000 audit[5749]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffce51f290 a2=3 a3=1 items=0 ppid=1 pid=5749 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:57.517523 kernel: audit: type=1300 audit(1734099477.482:1504): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffce51f290 a2=3 a3=1 items=0 ppid=1 pid=5749 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:57.482000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:57.521298 kernel: audit: type=1327 audit(1734099477.482:1504): proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:57.526619 systemd-logind[1805]: New session 22 of user core. Dec 13 14:17:57.532217 systemd[1]: Started session-22.scope. Dec 13 14:17:57.552000 audit[5749]: USER_START pid=5749 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:57.564000 audit[5751]: CRED_ACQ pid=5751 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:57.575535 kernel: audit: type=1105 audit(1734099477.552:1505): pid=5749 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:57.575660 kernel: audit: type=1103 audit(1734099477.564:1506): pid=5751 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:57.827942 sshd[5749]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:57.829000 audit[5749]: USER_END pid=5749 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:57.834281 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 14:17:57.835885 systemd[1]: sshd@21-172.31.24.217:22-139.178.89.65:43486.service: Deactivated successfully. Dec 13 14:17:57.829000 audit[5749]: CRED_DISP pid=5749 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:57.843448 systemd-logind[1805]: Session 22 logged out. Waiting for processes to exit. Dec 13 14:17:57.845675 systemd-logind[1805]: Removed session 22. Dec 13 14:17:57.851009 kernel: audit: type=1106 audit(1734099477.829:1507): pid=5749 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:57.851154 kernel: audit: type=1104 audit(1734099477.829:1508): pid=5749 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:57.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.24.217:22-139.178.89.65:43486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.389000 audit[5761]: NETFILTER_CFG table=filter:126 family=2 entries=20 op=nft_register_rule pid=5761 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:59.389000 audit[5761]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffeeb8c610 a2=0 a3=1 items=0 ppid=3062 pid=5761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:59.389000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:59.406000 audit[5761]: NETFILTER_CFG table=nat:127 family=2 entries=106 op=nft_register_chain pid=5761 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:59.406000 audit[5761]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffeeb8c610 a2=0 a3=1 items=0 ppid=3062 pid=5761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:59.406000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:00.136808 systemd[1]: run-containerd-runc-k8s.io-ba32901cf72a70b3cd1512697fbe4db89aaed9248d9e0a2c225edb89bdc0281e-runc.kcBsbz.mount: Deactivated successfully. Dec 13 14:18:02.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.24.217:22-139.178.89.65:33872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.858333 systemd[1]: Started sshd@22-172.31.24.217:22-139.178.89.65:33872.service. Dec 13 14:18:02.861227 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:18:02.861329 kernel: audit: type=1130 audit(1734099482.857:1512): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.24.217:22-139.178.89.65:33872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.037000 audit[5788]: USER_ACCT pid=5788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:03.039026 sshd[5788]: Accepted publickey for core from 139.178.89.65 port 33872 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:18:03.050268 kernel: audit: type=1101 audit(1734099483.037:1513): pid=5788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:03.049000 audit[5788]: CRED_ACQ pid=5788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:03.052142 sshd[5788]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:03.066720 kernel: audit: type=1103 audit(1734099483.049:1514): pid=5788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:03.067046 kernel: audit: type=1006 audit(1734099483.049:1515): pid=5788 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 14:18:03.067225 kernel: audit: type=1300 audit(1734099483.049:1515): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9809e40 a2=3 a3=1 items=0 ppid=1 pid=5788 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:03.049000 audit[5788]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9809e40 a2=3 a3=1 items=0 ppid=1 pid=5788 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:03.049000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:03.080579 kernel: audit: type=1327 audit(1734099483.049:1515): proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:03.087225 systemd-logind[1805]: New session 23 of user core. Dec 13 14:18:03.089284 systemd[1]: Started session-23.scope. Dec 13 14:18:03.103000 audit[5788]: USER_START pid=5788 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:03.103000 audit[5792]: CRED_ACQ pid=5792 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:03.123942 kernel: audit: type=1105 audit(1734099483.103:1516): pid=5788 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:03.124328 kernel: audit: type=1103 audit(1734099483.103:1517): pid=5792 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:03.384213 sshd[5788]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:03.386000 audit[5788]: USER_END pid=5788 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:03.392344 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 14:18:03.394703 systemd[1]: sshd@22-172.31.24.217:22-139.178.89.65:33872.service: Deactivated successfully. Dec 13 14:18:03.403342 systemd-logind[1805]: Session 23 logged out. Waiting for processes to exit. Dec 13 14:18:03.407294 systemd-logind[1805]: Removed session 23. Dec 13 14:18:03.387000 audit[5788]: CRED_DISP pid=5788 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:03.424081 kernel: audit: type=1106 audit(1734099483.386:1518): pid=5788 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:03.424431 kernel: audit: type=1104 audit(1734099483.387:1519): pid=5788 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:03.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.24.217:22-139.178.89.65:33872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:04.361919 update_engine[1807]: I1213 14:18:04.361830 1807 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Dec 13 14:18:04.361919 update_engine[1807]: I1213 14:18:04.361917 1807 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Dec 13 14:18:04.363424 update_engine[1807]: I1213 14:18:04.363332 1807 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Dec 13 14:18:04.364569 update_engine[1807]: I1213 14:18:04.364508 1807 omaha_request_params.cc:62] Current group set to lts Dec 13 14:18:04.366422 update_engine[1807]: I1213 14:18:04.366184 1807 update_attempter.cc:499] Already updated boot flags. Skipping. Dec 13 14:18:04.366422 update_engine[1807]: I1213 14:18:04.366222 1807 update_attempter.cc:643] Scheduling an action processor start. Dec 13 14:18:04.366422 update_engine[1807]: I1213 14:18:04.366258 1807 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Dec 13 14:18:04.366422 update_engine[1807]: I1213 14:18:04.366338 1807 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Dec 13 14:18:04.367758 update_engine[1807]: I1213 14:18:04.367695 1807 omaha_request_action.cc:270] Posting an Omaha request to disabled Dec 13 14:18:04.367758 update_engine[1807]: I1213 14:18:04.367740 1807 omaha_request_action.cc:271] Request: Dec 13 14:18:04.367758 update_engine[1807]: Dec 13 14:18:04.367758 update_engine[1807]: Dec 13 14:18:04.367758 update_engine[1807]: Dec 13 14:18:04.367758 update_engine[1807]: Dec 13 14:18:04.367758 update_engine[1807]: Dec 13 14:18:04.367758 update_engine[1807]: Dec 13 14:18:04.367758 update_engine[1807]: Dec 13 14:18:04.367758 update_engine[1807]: Dec 13 14:18:04.367758 update_engine[1807]: I1213 14:18:04.367761 1807 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Dec 13 14:18:04.369129 locksmithd[1860]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Dec 13 14:18:04.375147 update_engine[1807]: I1213 14:18:04.375080 1807 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Dec 13 14:18:04.375621 update_engine[1807]: I1213 14:18:04.375573 1807 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Dec 13 14:18:04.388216 update_engine[1807]: E1213 14:18:04.388087 1807 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Dec 13 14:18:04.388419 update_engine[1807]: I1213 14:18:04.388367 1807 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Dec 13 14:18:08.416203 systemd[1]: Started sshd@23-172.31.24.217:22-139.178.89.65:56702.service. Dec 13 14:18:08.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.24.217:22-139.178.89.65:56702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:08.420006 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:18:08.420252 kernel: audit: type=1130 audit(1734099488.416:1521): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.24.217:22-139.178.89.65:56702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:08.603000 audit[5802]: USER_ACCT pid=5802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:08.607210 sshd[5802]: Accepted publickey for core from 139.178.89.65 port 56702 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:18:08.616741 sshd[5802]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:08.614000 audit[5802]: CRED_ACQ pid=5802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:08.626764 kernel: audit: type=1101 audit(1734099488.603:1522): pid=5802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:08.626895 kernel: audit: type=1103 audit(1734099488.614:1523): pid=5802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:08.633282 kernel: audit: type=1006 audit(1734099488.614:1524): pid=5802 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 14:18:08.614000 audit[5802]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd9bbcab0 a2=3 a3=1 items=0 ppid=1 pid=5802 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:08.645897 kernel: audit: type=1300 audit(1734099488.614:1524): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd9bbcab0 a2=3 a3=1 items=0 ppid=1 pid=5802 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:08.646167 kernel: audit: type=1327 audit(1734099488.614:1524): proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:08.614000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:08.644807 systemd-logind[1805]: New session 24 of user core. Dec 13 14:18:08.647427 systemd[1]: Started session-24.scope. Dec 13 14:18:08.662000 audit[5802]: USER_START pid=5802 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:08.675000 audit[5804]: CRED_ACQ pid=5804 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:08.686703 kernel: audit: type=1105 audit(1734099488.662:1525): pid=5802 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:08.686864 kernel: audit: type=1103 audit(1734099488.675:1526): pid=5804 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:08.982148 sshd[5802]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:08.983000 audit[5802]: USER_END pid=5802 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:08.990347 systemd[1]: sshd@23-172.31.24.217:22-139.178.89.65:56702.service: Deactivated successfully. Dec 13 14:18:08.991954 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 14:18:08.993144 systemd-logind[1805]: Session 24 logged out. Waiting for processes to exit. Dec 13 14:18:08.985000 audit[5802]: CRED_DISP pid=5802 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:08.998972 systemd-logind[1805]: Removed session 24. Dec 13 14:18:09.005512 kernel: audit: type=1106 audit(1734099488.983:1527): pid=5802 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:09.005672 kernel: audit: type=1104 audit(1734099488.985:1528): pid=5802 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:08.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.24.217:22-139.178.89.65:56702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:14.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.24.217:22-139.178.89.65:56706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:14.018489 systemd[1]: Started sshd@24-172.31.24.217:22-139.178.89.65:56706.service. Dec 13 14:18:14.021490 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:18:14.021581 kernel: audit: type=1130 audit(1734099494.017:1530): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.24.217:22-139.178.89.65:56706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:14.031000 audit[2762]: AVC avc: denied { watch } for pid=2762 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:14.031000 audit[2762]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001995500 a2=fc6 a3=0 items=0 ppid=2530 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:18:14.057921 kernel: audit: type=1400 audit(1734099494.031:1531): avc: denied { watch } for pid=2762 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:14.058084 kernel: audit: type=1300 audit(1734099494.031:1531): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001995500 a2=fc6 a3=0 items=0 ppid=2530 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:18:14.031000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:18:14.069773 kernel: audit: type=1327 audit(1734099494.031:1531): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:18:14.031000 audit[2762]: AVC avc: denied { watch } for pid=2762 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:14.079055 kernel: audit: type=1400 audit(1734099494.031:1532): avc: denied { watch } for pid=2762 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:14.031000 audit[2762]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40019dd040 a2=fc6 a3=0 items=0 ppid=2530 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:18:14.091356 kernel: audit: type=1300 audit(1734099494.031:1532): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40019dd040 a2=fc6 a3=0 items=0 ppid=2530 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:18:14.091472 kernel: audit: type=1327 audit(1734099494.031:1532): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:18:14.031000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:18:14.188000 audit[5815]: USER_ACCT pid=5815 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:14.189759 sshd[5815]: Accepted publickey for core from 139.178.89.65 port 56706 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:18:14.201154 kernel: audit: type=1101 audit(1734099494.188:1533): pid=5815 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:14.202408 sshd[5815]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:14.200000 audit[5815]: CRED_ACQ pid=5815 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:14.214624 systemd[1]: Started session-25.scope. Dec 13 14:18:14.218642 systemd-logind[1805]: New session 25 of user core. Dec 13 14:18:14.222760 kernel: audit: type=1103 audit(1734099494.200:1534): pid=5815 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:14.222963 kernel: audit: type=1006 audit(1734099494.200:1535): pid=5815 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 14:18:14.200000 audit[5815]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd4515160 a2=3 a3=1 items=0 ppid=1 pid=5815 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:14.200000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:14.242000 audit[5815]: USER_START pid=5815 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:14.246000 audit[5817]: CRED_ACQ pid=5817 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:14.361656 update_engine[1807]: I1213 14:18:14.360630 1807 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Dec 13 14:18:14.361656 update_engine[1807]: I1213 14:18:14.361030 1807 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Dec 13 14:18:14.361656 update_engine[1807]: I1213 14:18:14.361356 1807 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Dec 13 14:18:14.362642 update_engine[1807]: E1213 14:18:14.362462 1807 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Dec 13 14:18:14.362642 update_engine[1807]: I1213 14:18:14.362601 1807 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Dec 13 14:18:14.494470 sshd[5815]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:14.495000 audit[5815]: USER_END pid=5815 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:14.496000 audit[5815]: CRED_DISP pid=5815 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:14.499678 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 14:18:14.501068 systemd-logind[1805]: Session 25 logged out. Waiting for processes to exit. Dec 13 14:18:14.501560 systemd[1]: sshd@24-172.31.24.217:22-139.178.89.65:56706.service: Deactivated successfully. Dec 13 14:18:14.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.24.217:22-139.178.89.65:56706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:14.504466 systemd-logind[1805]: Removed session 25. Dec 13 14:18:14.816000 audit[2769]: AVC avc: denied { watch } for pid=2769 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:14.816000 audit[2769]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7a a1=4007be7560 a2=fc6 a3=0 items=0 ppid=2499 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 key=(null) Dec 13 14:18:14.816000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32342E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:18:14.821000 audit[2769]: AVC avc: denied { watch } for pid=2769 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=8274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:14.821000 audit[2769]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7a a1=40078071a0 a2=fc6 a3=0 items=0 ppid=2499 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 key=(null) Dec 13 14:18:14.821000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32342E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:18:14.845000 audit[2769]: AVC avc: denied { watch } for pid=2769 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=8281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:14.845000 audit[2769]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7a a1=4007807920 a2=fc6 a3=0 items=0 ppid=2499 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 key=(null) Dec 13 14:18:14.845000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32342E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:18:14.845000 audit[2769]: AVC avc: denied { watch } for pid=2769 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:14.845000 audit[2769]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7b a1=4003174fe0 a2=fc6 a3=0 items=0 ppid=2499 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 key=(null) Dec 13 14:18:14.845000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32342E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:18:14.953000 audit[2769]: AVC avc: denied { watch } for pid=2769 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:14.953000 audit[2769]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7a a1=4007d84540 a2=fc6 a3=0 items=0 ppid=2499 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 key=(null) Dec 13 14:18:14.953000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32342E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:18:14.953000 audit[2769]: AVC avc: denied { watch } for pid=2769 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:14.953000 audit[2769]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7a a1=400d5cf100 a2=fc6 a3=0 items=0 ppid=2499 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c409,c857 key=(null) Dec 13 14:18:14.953000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32342E323137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:18:19.526182 systemd[1]: Started sshd@25-172.31.24.217:22-139.178.89.65:34020.service. Dec 13 14:18:19.538699 kernel: kauditd_printk_skb: 25 callbacks suppressed Dec 13 14:18:19.538861 kernel: audit: type=1130 audit(1734099499.525:1547): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.24.217:22-139.178.89.65:34020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:19.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.24.217:22-139.178.89.65:34020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:19.725000 audit[5829]: USER_ACCT pid=5829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:19.727316 sshd[5829]: Accepted publickey for core from 139.178.89.65 port 34020 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:18:19.738294 kernel: audit: type=1101 audit(1734099499.725:1548): pid=5829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:19.737000 audit[5829]: CRED_ACQ pid=5829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:19.739833 sshd[5829]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:19.754561 kernel: audit: type=1103 audit(1734099499.737:1549): pid=5829 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:19.754714 kernel: audit: type=1006 audit(1734099499.737:1550): pid=5829 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 14:18:19.737000 audit[5829]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd675ca70 a2=3 a3=1 items=0 ppid=1 pid=5829 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:19.765423 kernel: audit: type=1300 audit(1734099499.737:1550): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd675ca70 a2=3 a3=1 items=0 ppid=1 pid=5829 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:19.737000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:19.770964 kernel: audit: type=1327 audit(1734099499.737:1550): proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:19.770018 systemd-logind[1805]: New session 26 of user core. Dec 13 14:18:19.774023 systemd[1]: Started session-26.scope. Dec 13 14:18:19.787000 audit[5829]: USER_START pid=5829 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:19.802336 kernel: audit: type=1105 audit(1734099499.787:1551): pid=5829 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:19.802489 kernel: audit: type=1103 audit(1734099499.799:1552): pid=5831 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:19.799000 audit[5831]: CRED_ACQ pid=5831 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:20.052675 sshd[5829]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:20.054000 audit[5829]: USER_END pid=5829 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:20.054000 audit[5829]: CRED_DISP pid=5829 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:20.066837 systemd[1]: sshd@25-172.31.24.217:22-139.178.89.65:34020.service: Deactivated successfully. Dec 13 14:18:20.068180 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 14:18:20.074913 kernel: audit: type=1106 audit(1734099500.054:1553): pid=5829 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:20.075170 kernel: audit: type=1104 audit(1734099500.054:1554): pid=5829 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:20.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.24.217:22-139.178.89.65:34020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:20.076829 systemd-logind[1805]: Session 26 logged out. Waiting for processes to exit. Dec 13 14:18:20.079059 systemd-logind[1805]: Removed session 26. Dec 13 14:18:24.362787 update_engine[1807]: I1213 14:18:24.361866 1807 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Dec 13 14:18:24.362787 update_engine[1807]: I1213 14:18:24.362242 1807 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Dec 13 14:18:24.362787 update_engine[1807]: I1213 14:18:24.362560 1807 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Dec 13 14:18:24.364017 update_engine[1807]: E1213 14:18:24.363840 1807 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Dec 13 14:18:24.364017 update_engine[1807]: I1213 14:18:24.363978 1807 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Dec 13 14:18:24.556000 audit[5178]: AVC avc: denied { watch } for pid=5178 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_16_56.709204984/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c346,c562 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c346,c562 tclass=file permissive=0 Dec 13 14:18:24.559897 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:18:24.560079 kernel: audit: type=1400 audit(1734099504.556:1556): avc: denied { watch } for pid=5178 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_16_56.709204984/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c346,c562 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c346,c562 tclass=file permissive=0 Dec 13 14:18:24.556000 audit[5178]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001f6a680 a2=fc6 a3=0 items=0 ppid=4622 pid=5178 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c346,c562 key=(null) Dec 13 14:18:24.581916 kernel: audit: type=1300 audit(1734099504.556:1556): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001f6a680 a2=fc6 a3=0 items=0 ppid=4622 pid=5178 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c346,c562 key=(null) Dec 13 14:18:24.582147 kernel: audit: type=1327 audit(1734099504.556:1556): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:18:24.556000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:18:25.085861 systemd[1]: Started sshd@26-172.31.24.217:22-139.178.89.65:34036.service. Dec 13 14:18:25.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.24.217:22-139.178.89.65:34036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:25.097464 kernel: audit: type=1130 audit(1734099505.085:1557): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.24.217:22-139.178.89.65:34036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:25.286000 audit[5861]: USER_ACCT pid=5861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:25.295647 sshd[5861]: Accepted publickey for core from 139.178.89.65 port 34036 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:18:25.296781 sshd[5861]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:25.291000 audit[5861]: CRED_ACQ pid=5861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:25.306173 kernel: audit: type=1101 audit(1734099505.286:1558): pid=5861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:25.306362 kernel: audit: type=1103 audit(1734099505.291:1559): pid=5861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:25.312599 kernel: audit: type=1006 audit(1734099505.291:1560): pid=5861 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Dec 13 14:18:25.291000 audit[5861]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe4ffb550 a2=3 a3=1 items=0 ppid=1 pid=5861 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:25.323195 kernel: audit: type=1300 audit(1734099505.291:1560): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe4ffb550 a2=3 a3=1 items=0 ppid=1 pid=5861 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:25.291000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:25.327168 kernel: audit: type=1327 audit(1734099505.291:1560): proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:25.336047 systemd[1]: Started session-27.scope. Dec 13 14:18:25.338200 systemd-logind[1805]: New session 27 of user core. Dec 13 14:18:25.348000 audit[5861]: USER_START pid=5861 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:25.362308 kernel: audit: type=1105 audit(1734099505.348:1561): pid=5861 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:25.360000 audit[5864]: CRED_ACQ pid=5864 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:25.639691 sshd[5861]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:25.641000 audit[5861]: USER_END pid=5861 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:25.641000 audit[5861]: CRED_DISP pid=5861 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:25.646404 systemd[1]: session-27.scope: Deactivated successfully. Dec 13 14:18:25.648806 systemd[1]: sshd@26-172.31.24.217:22-139.178.89.65:34036.service: Deactivated successfully. Dec 13 14:18:25.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.24.217:22-139.178.89.65:34036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:25.649282 systemd-logind[1805]: Session 27 logged out. Waiting for processes to exit. Dec 13 14:18:25.655501 systemd-logind[1805]: Removed session 27. Dec 13 14:18:26.181000 audit[5238]: AVC avc: denied { watch } for pid=5238 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_16_56.1316631105/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c386 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c146,c386 tclass=file permissive=0 Dec 13 14:18:26.181000 audit[5238]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4001e2be40 a2=fc6 a3=0 items=0 ppid=4850 pid=5238 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c386 key=(null) Dec 13 14:18:26.181000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:18:27.518000 audit[2762]: AVC avc: denied { watch } for pid=2762 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:27.518000 audit[2762]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002ed6040 a2=fc6 a3=0 items=0 ppid=2530 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:18:27.518000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:18:27.519000 audit[2762]: AVC avc: denied { watch } for pid=2762 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:27.519000 audit[2762]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002ed6060 a2=fc6 a3=0 items=0 ppid=2530 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:18:27.519000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:18:27.522000 audit[2762]: AVC avc: denied { watch } for pid=2762 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:27.522000 audit[2762]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002ed6080 a2=fc6 a3=0 items=0 ppid=2530 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:18:27.522000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:18:27.525000 audit[2762]: AVC avc: denied { watch } for pid=2762 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:27.525000 audit[2762]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002ed60a0 a2=fc6 a3=0 items=0 ppid=2530 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:18:27.525000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:18:30.686457 kernel: kauditd_printk_skb: 19 callbacks suppressed Dec 13 14:18:30.686685 kernel: audit: type=1130 audit(1734099510.667:1571): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.24.217:22-139.178.89.65:41130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:30.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.24.217:22-139.178.89.65:41130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:30.668631 systemd[1]: Started sshd@27-172.31.24.217:22-139.178.89.65:41130.service. Dec 13 14:18:30.878000 audit[5922]: USER_ACCT pid=5922 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:30.883924 sshd[5922]: Accepted publickey for core from 139.178.89.65 port 41130 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:18:30.886484 sshd[5922]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:30.881000 audit[5922]: CRED_ACQ pid=5922 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:30.899287 kernel: audit: type=1101 audit(1734099510.878:1572): pid=5922 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:30.899574 kernel: audit: type=1103 audit(1734099510.881:1573): pid=5922 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:30.899675 kernel: audit: type=1006 audit(1734099510.881:1574): pid=5922 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Dec 13 14:18:30.905479 kernel: audit: type=1300 audit(1734099510.881:1574): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffee0e7c20 a2=3 a3=1 items=0 ppid=1 pid=5922 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:30.881000 audit[5922]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffee0e7c20 a2=3 a3=1 items=0 ppid=1 pid=5922 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:30.912728 systemd[1]: Started session-28.scope. Dec 13 14:18:30.916194 kernel: audit: type=1327 audit(1734099510.881:1574): proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:30.881000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:30.915306 systemd-logind[1805]: New session 28 of user core. Dec 13 14:18:30.935000 audit[5922]: USER_START pid=5922 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:30.939000 audit[5925]: CRED_ACQ pid=5925 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:30.956730 kernel: audit: type=1105 audit(1734099510.935:1575): pid=5922 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:30.956895 kernel: audit: type=1103 audit(1734099510.939:1576): pid=5925 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:31.236261 sshd[5922]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:31.238000 audit[5922]: USER_END pid=5922 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:31.243252 systemd-logind[1805]: Session 28 logged out. Waiting for processes to exit. Dec 13 14:18:31.245049 systemd[1]: session-28.scope: Deactivated successfully. Dec 13 14:18:31.246289 systemd[1]: sshd@27-172.31.24.217:22-139.178.89.65:41130.service: Deactivated successfully. Dec 13 14:18:31.250055 systemd-logind[1805]: Removed session 28. Dec 13 14:18:31.239000 audit[5922]: CRED_DISP pid=5922 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:31.259997 kernel: audit: type=1106 audit(1734099511.238:1577): pid=5922 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:31.260196 kernel: audit: type=1104 audit(1734099511.239:1578): pid=5922 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:31.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.24.217:22-139.178.89.65:41130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:34.362849 update_engine[1807]: I1213 14:18:34.361867 1807 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Dec 13 14:18:34.362849 update_engine[1807]: I1213 14:18:34.362370 1807 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Dec 13 14:18:34.362849 update_engine[1807]: I1213 14:18:34.362778 1807 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Dec 13 14:18:34.365394 update_engine[1807]: E1213 14:18:34.364342 1807 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Dec 13 14:18:34.365394 update_engine[1807]: I1213 14:18:34.364524 1807 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Dec 13 14:18:34.365394 update_engine[1807]: I1213 14:18:34.364545 1807 omaha_request_action.cc:621] Omaha request response: Dec 13 14:18:34.365394 update_engine[1807]: E1213 14:18:34.364692 1807 omaha_request_action.cc:640] Omaha request network transfer failed. Dec 13 14:18:34.365394 update_engine[1807]: I1213 14:18:34.364748 1807 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Dec 13 14:18:34.365394 update_engine[1807]: I1213 14:18:34.364760 1807 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Dec 13 14:18:34.365394 update_engine[1807]: I1213 14:18:34.364769 1807 update_attempter.cc:306] Processing Done. Dec 13 14:18:34.365394 update_engine[1807]: E1213 14:18:34.364789 1807 update_attempter.cc:619] Update failed. Dec 13 14:18:34.365394 update_engine[1807]: I1213 14:18:34.364802 1807 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Dec 13 14:18:34.365394 update_engine[1807]: I1213 14:18:34.364812 1807 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Dec 13 14:18:34.365394 update_engine[1807]: I1213 14:18:34.364822 1807 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Dec 13 14:18:34.365394 update_engine[1807]: I1213 14:18:34.364929 1807 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Dec 13 14:18:34.365394 update_engine[1807]: I1213 14:18:34.364964 1807 omaha_request_action.cc:270] Posting an Omaha request to disabled Dec 13 14:18:34.365394 update_engine[1807]: I1213 14:18:34.364995 1807 omaha_request_action.cc:271] Request: Dec 13 14:18:34.365394 update_engine[1807]: Dec 13 14:18:34.365394 update_engine[1807]: Dec 13 14:18:34.365394 update_engine[1807]: Dec 13 14:18:34.366816 update_engine[1807]: Dec 13 14:18:34.366816 update_engine[1807]: Dec 13 14:18:34.366816 update_engine[1807]: Dec 13 14:18:34.366816 update_engine[1807]: I1213 14:18:34.365011 1807 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Dec 13 14:18:34.366816 update_engine[1807]: I1213 14:18:34.365437 1807 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Dec 13 14:18:34.366816 update_engine[1807]: I1213 14:18:34.365854 1807 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Dec 13 14:18:34.366816 update_engine[1807]: E1213 14:18:34.366242 1807 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Dec 13 14:18:34.366816 update_engine[1807]: I1213 14:18:34.366389 1807 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Dec 13 14:18:34.366816 update_engine[1807]: I1213 14:18:34.366407 1807 omaha_request_action.cc:621] Omaha request response: Dec 13 14:18:34.366816 update_engine[1807]: I1213 14:18:34.366420 1807 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Dec 13 14:18:34.366816 update_engine[1807]: I1213 14:18:34.366430 1807 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Dec 13 14:18:34.366816 update_engine[1807]: I1213 14:18:34.366439 1807 update_attempter.cc:306] Processing Done. Dec 13 14:18:34.366816 update_engine[1807]: I1213 14:18:34.366451 1807 update_attempter.cc:310] Error event sent. Dec 13 14:18:34.366816 update_engine[1807]: I1213 14:18:34.366464 1807 update_check_scheduler.cc:74] Next update check in 42m32s Dec 13 14:18:34.368698 locksmithd[1860]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Dec 13 14:18:34.369530 locksmithd[1860]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Dec 13 14:18:44.825879 systemd[1]: cri-containerd-38dff614c58114000c3bbf34764151deb1da6d3a4cbe0f3863243a9148d9dffe.scope: Deactivated successfully. Dec 13 14:18:44.831657 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:18:44.831810 kernel: audit: type=1334 audit(1734099524.825:1580): prog-id=120 op=UNLOAD Dec 13 14:18:44.825000 audit: BPF prog-id=120 op=UNLOAD Dec 13 14:18:44.826654 systemd[1]: cri-containerd-38dff614c58114000c3bbf34764151deb1da6d3a4cbe0f3863243a9148d9dffe.scope: Consumed 8.317s CPU time. Dec 13 14:18:44.836020 kernel: audit: type=1334 audit(1734099524.831:1581): prog-id=123 op=UNLOAD Dec 13 14:18:44.831000 audit: BPF prog-id=123 op=UNLOAD Dec 13 14:18:44.870726 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-38dff614c58114000c3bbf34764151deb1da6d3a4cbe0f3863243a9148d9dffe-rootfs.mount: Deactivated successfully. Dec 13 14:18:44.872332 env[1824]: time="2024-12-13T14:18:44.872255893Z" level=info msg="shim disconnected" id=38dff614c58114000c3bbf34764151deb1da6d3a4cbe0f3863243a9148d9dffe Dec 13 14:18:44.874237 env[1824]: time="2024-12-13T14:18:44.874165947Z" level=warning msg="cleaning up after shim disconnected" id=38dff614c58114000c3bbf34764151deb1da6d3a4cbe0f3863243a9148d9dffe namespace=k8s.io Dec 13 14:18:44.874237 env[1824]: time="2024-12-13T14:18:44.874218555Z" level=info msg="cleaning up dead shim" Dec 13 14:18:44.890787 env[1824]: time="2024-12-13T14:18:44.890699264Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:18:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5967 runtime=io.containerd.runc.v2\n" Dec 13 14:18:45.331957 kubelet[2897]: I1213 14:18:45.331890 2897 scope.go:117] "RemoveContainer" containerID="38dff614c58114000c3bbf34764151deb1da6d3a4cbe0f3863243a9148d9dffe" Dec 13 14:18:45.336179 env[1824]: time="2024-12-13T14:18:45.336050458Z" level=info msg="CreateContainer within sandbox \"f8323b93dc33af4335053e3a614475ea485ce7721130f4fe4c00715c94fb463f\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Dec 13 14:18:45.369588 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount562025872.mount: Deactivated successfully. Dec 13 14:18:45.384505 env[1824]: time="2024-12-13T14:18:45.384428137Z" level=info msg="CreateContainer within sandbox \"f8323b93dc33af4335053e3a614475ea485ce7721130f4fe4c00715c94fb463f\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"0c1f37de251157e14d844ca16d183de0cc747a95a76034a17ea966783ea973a7\"" Dec 13 14:18:45.385962 env[1824]: time="2024-12-13T14:18:45.385877640Z" level=info msg="StartContainer for \"0c1f37de251157e14d844ca16d183de0cc747a95a76034a17ea966783ea973a7\"" Dec 13 14:18:45.434186 systemd[1]: Started cri-containerd-0c1f37de251157e14d844ca16d183de0cc747a95a76034a17ea966783ea973a7.scope. Dec 13 14:18:45.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489380 kernel: audit: type=1400 audit(1734099525.474:1582): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489607 kernel: audit: type=1400 audit(1734099525.474:1583): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.499686 kernel: audit: type=1400 audit(1734099525.474:1584): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.500006 kernel: audit: type=1400 audit(1734099525.474:1585): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.514368 kernel: audit: type=1400 audit(1734099525.474:1586): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.523279 kernel: audit: type=1400 audit(1734099525.474:1587): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.533355 kernel: audit: type=1400 audit(1734099525.474:1588): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.544592 kernel: audit: type=1400 audit(1734099525.474:1589): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.481000 audit: BPF prog-id=214 op=LOAD Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bfb38 a2=10 a3=0 items=0 ppid=3033 pid=5987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:45.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063316633376465323531313537653134643834346361313664313833 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bf5a0 a2=3c a3=0 items=0 ppid=3033 pid=5987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:45.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063316633376465323531313537653134643834346361313664313833 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit: BPF prog-id=215 op=LOAD Dec 13 14:18:45.489000 audit[5987]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bf8e0 a2=78 a3=0 items=0 ppid=3033 pid=5987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:45.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063316633376465323531313537653134643834346361313664313833 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit: BPF prog-id=216 op=LOAD Dec 13 14:18:45.489000 audit[5987]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bf670 a2=78 a3=0 items=0 ppid=3033 pid=5987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:45.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063316633376465323531313537653134643834346361313664313833 Dec 13 14:18:45.489000 audit: BPF prog-id=216 op=UNLOAD Dec 13 14:18:45.489000 audit: BPF prog-id=215 op=UNLOAD Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { perfmon } for pid=5987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit[5987]: AVC avc: denied { bpf } for pid=5987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:45.489000 audit: BPF prog-id=217 op=LOAD Dec 13 14:18:45.489000 audit[5987]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bfb40 a2=78 a3=0 items=0 ppid=3033 pid=5987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:45.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063316633376465323531313537653134643834346361313664313833 Dec 13 14:18:45.560745 env[1824]: time="2024-12-13T14:18:45.560674398Z" level=info msg="StartContainer for \"0c1f37de251157e14d844ca16d183de0cc747a95a76034a17ea966783ea973a7\" returns successfully" Dec 13 14:18:46.002269 systemd[1]: cri-containerd-9e54fa37d24dfcce020e205b5c25fac74423804f2a7a655b0404505b981b33d7.scope: Deactivated successfully. Dec 13 14:18:46.002951 systemd[1]: cri-containerd-9e54fa37d24dfcce020e205b5c25fac74423804f2a7a655b0404505b981b33d7.scope: Consumed 5.462s CPU time. Dec 13 14:18:46.005000 audit: BPF prog-id=83 op=UNLOAD Dec 13 14:18:46.005000 audit: BPF prog-id=93 op=UNLOAD Dec 13 14:18:46.059802 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9e54fa37d24dfcce020e205b5c25fac74423804f2a7a655b0404505b981b33d7-rootfs.mount: Deactivated successfully. Dec 13 14:18:46.062975 env[1824]: time="2024-12-13T14:18:46.062856159Z" level=info msg="shim disconnected" id=9e54fa37d24dfcce020e205b5c25fac74423804f2a7a655b0404505b981b33d7 Dec 13 14:18:46.062975 env[1824]: time="2024-12-13T14:18:46.062931268Z" level=warning msg="cleaning up after shim disconnected" id=9e54fa37d24dfcce020e205b5c25fac74423804f2a7a655b0404505b981b33d7 namespace=k8s.io Dec 13 14:18:46.062975 env[1824]: time="2024-12-13T14:18:46.062954560Z" level=info msg="cleaning up dead shim" Dec 13 14:18:46.080686 env[1824]: time="2024-12-13T14:18:46.080585416Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:18:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6029 runtime=io.containerd.runc.v2\n" Dec 13 14:18:46.336755 kubelet[2897]: I1213 14:18:46.336690 2897 scope.go:117] "RemoveContainer" containerID="9e54fa37d24dfcce020e205b5c25fac74423804f2a7a655b0404505b981b33d7" Dec 13 14:18:46.342580 env[1824]: time="2024-12-13T14:18:46.342503016Z" level=info msg="CreateContainer within sandbox \"3b45c48681753d5540347a175210d28f0e3d8bda6a8060ca5ecabdee09b74de2\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Dec 13 14:18:46.384269 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4209631301.mount: Deactivated successfully. Dec 13 14:18:46.390970 env[1824]: time="2024-12-13T14:18:46.390853308Z" level=info msg="CreateContainer within sandbox \"3b45c48681753d5540347a175210d28f0e3d8bda6a8060ca5ecabdee09b74de2\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"7d8f2022ced71c4db649f5fbf4c22a01cfe87a9065a461ac8235c611be80f5ab\"" Dec 13 14:18:46.391922 env[1824]: time="2024-12-13T14:18:46.391856120Z" level=info msg="StartContainer for \"7d8f2022ced71c4db649f5fbf4c22a01cfe87a9065a461ac8235c611be80f5ab\"" Dec 13 14:18:46.448534 systemd[1]: Started cri-containerd-7d8f2022ced71c4db649f5fbf4c22a01cfe87a9065a461ac8235c611be80f5ab.scope. Dec 13 14:18:46.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.496000 audit: BPF prog-id=218 op=LOAD Dec 13 14:18:46.498000 audit[6050]: AVC avc: denied { bpf } for pid=6050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.498000 audit[6050]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2530 pid=6050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:46.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764386632303232636564373163346462363439663566626634633232 Dec 13 14:18:46.500000 audit[6050]: AVC avc: denied { perfmon } for pid=6050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.500000 audit[6050]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2530 pid=6050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:46.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764386632303232636564373163346462363439663566626634633232 Dec 13 14:18:46.500000 audit[6050]: AVC avc: denied { bpf } for pid=6050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.500000 audit[6050]: AVC avc: denied { bpf } for pid=6050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.500000 audit[6050]: AVC avc: denied { bpf } for pid=6050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.500000 audit[6050]: AVC avc: denied { perfmon } for pid=6050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.500000 audit[6050]: AVC avc: denied { perfmon } for pid=6050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.500000 audit[6050]: AVC avc: denied { perfmon } for pid=6050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.500000 audit[6050]: AVC avc: denied { perfmon } for pid=6050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.500000 audit[6050]: AVC avc: denied { perfmon } for pid=6050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.500000 audit[6050]: AVC avc: denied { bpf } for pid=6050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.500000 audit[6050]: AVC avc: denied { bpf } for pid=6050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.500000 audit: BPF prog-id=219 op=LOAD Dec 13 14:18:46.500000 audit[6050]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2530 pid=6050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:46.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764386632303232636564373163346462363439663566626634633232 Dec 13 14:18:46.503000 audit[6050]: AVC avc: denied { bpf } for pid=6050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.503000 audit[6050]: AVC avc: denied { bpf } for pid=6050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.503000 audit[6050]: AVC avc: denied { perfmon } for pid=6050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.503000 audit[6050]: AVC avc: denied { perfmon } for pid=6050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.503000 audit[6050]: AVC avc: denied { perfmon } for pid=6050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.503000 audit[6050]: AVC avc: denied { perfmon } for pid=6050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.503000 audit[6050]: AVC avc: denied { perfmon } for pid=6050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.503000 audit[6050]: AVC avc: denied { bpf } for pid=6050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.503000 audit[6050]: AVC avc: denied { bpf } for pid=6050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.503000 audit: BPF prog-id=220 op=LOAD Dec 13 14:18:46.503000 audit[6050]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2530 pid=6050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:46.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764386632303232636564373163346462363439663566626634633232 Dec 13 14:18:46.505000 audit: BPF prog-id=220 op=UNLOAD Dec 13 14:18:46.506000 audit: BPF prog-id=219 op=UNLOAD Dec 13 14:18:46.506000 audit[6050]: AVC avc: denied { bpf } for pid=6050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.506000 audit[6050]: AVC avc: denied { bpf } for pid=6050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.506000 audit[6050]: AVC avc: denied { bpf } for pid=6050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.506000 audit[6050]: AVC avc: denied { perfmon } for pid=6050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.506000 audit[6050]: AVC avc: denied { perfmon } for pid=6050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.506000 audit[6050]: AVC avc: denied { perfmon } for pid=6050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.506000 audit[6050]: AVC avc: denied { perfmon } for pid=6050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.506000 audit[6050]: AVC avc: denied { perfmon } for pid=6050 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.506000 audit[6050]: AVC avc: denied { bpf } for pid=6050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.506000 audit[6050]: AVC avc: denied { bpf } for pid=6050 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.506000 audit: BPF prog-id=221 op=LOAD Dec 13 14:18:46.506000 audit[6050]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2530 pid=6050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:46.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764386632303232636564373163346462363439663566626634633232 Dec 13 14:18:46.561704 env[1824]: time="2024-12-13T14:18:46.561634969Z" level=info msg="StartContainer for \"7d8f2022ced71c4db649f5fbf4c22a01cfe87a9065a461ac8235c611be80f5ab\" returns successfully" Dec 13 14:18:50.699196 systemd[1]: cri-containerd-fa78714b27c3fa55a707d672782d3be861658f82e96799f19884a8d0eea2bb5f.scope: Deactivated successfully. Dec 13 14:18:50.699766 systemd[1]: cri-containerd-fa78714b27c3fa55a707d672782d3be861658f82e96799f19884a8d0eea2bb5f.scope: Consumed 4.034s CPU time. Dec 13 14:18:50.711350 kernel: kauditd_printk_skb: 108 callbacks suppressed Dec 13 14:18:50.711520 kernel: audit: type=1334 audit(1734099530.705:1620): prog-id=79 op=UNLOAD Dec 13 14:18:50.705000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:18:50.714914 kernel: audit: type=1334 audit(1734099530.705:1621): prog-id=94 op=UNLOAD Dec 13 14:18:50.705000 audit: BPF prog-id=94 op=UNLOAD Dec 13 14:18:50.757176 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-fa78714b27c3fa55a707d672782d3be861658f82e96799f19884a8d0eea2bb5f-rootfs.mount: Deactivated successfully. Dec 13 14:18:50.759844 env[1824]: time="2024-12-13T14:18:50.759778127Z" level=info msg="shim disconnected" id=fa78714b27c3fa55a707d672782d3be861658f82e96799f19884a8d0eea2bb5f Dec 13 14:18:50.762309 env[1824]: time="2024-12-13T14:18:50.762255173Z" level=warning msg="cleaning up after shim disconnected" id=fa78714b27c3fa55a707d672782d3be861658f82e96799f19884a8d0eea2bb5f namespace=k8s.io Dec 13 14:18:50.762504 env[1824]: time="2024-12-13T14:18:50.762471991Z" level=info msg="cleaning up dead shim" Dec 13 14:18:50.801576 env[1824]: time="2024-12-13T14:18:50.801519541Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:18:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6091 runtime=io.containerd.runc.v2\n" Dec 13 14:18:51.366323 kubelet[2897]: I1213 14:18:51.366269 2897 scope.go:117] "RemoveContainer" containerID="fa78714b27c3fa55a707d672782d3be861658f82e96799f19884a8d0eea2bb5f" Dec 13 14:18:51.371402 env[1824]: time="2024-12-13T14:18:51.371319678Z" level=info msg="CreateContainer within sandbox \"a3b20288704b3bcec04134316bc7d16f47ff1949af70f88da07683eb64b984da\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Dec 13 14:18:51.407100 env[1824]: time="2024-12-13T14:18:51.407037107Z" level=info msg="CreateContainer within sandbox \"a3b20288704b3bcec04134316bc7d16f47ff1949af70f88da07683eb64b984da\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"eee090bba4189f0f6754cb38b3a583d4415ba687f1ea4e81dd84356368f60b53\"" Dec 13 14:18:51.408224 env[1824]: time="2024-12-13T14:18:51.408167455Z" level=info msg="StartContainer for \"eee090bba4189f0f6754cb38b3a583d4415ba687f1ea4e81dd84356368f60b53\"" Dec 13 14:18:51.458574 systemd[1]: Started cri-containerd-eee090bba4189f0f6754cb38b3a583d4415ba687f1ea4e81dd84356368f60b53.scope. Dec 13 14:18:51.522000 audit[6062]: AVC avc: denied { watch } for pid=6062 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:51.522000 audit[6062]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400042a300 a2=fc6 a3=0 items=0 ppid=2530 pid=6062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:18:51.550927 kernel: audit: type=1400 audit(1734099531.522:1622): avc: denied { watch } for pid=6062 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:51.551135 kernel: audit: type=1300 audit(1734099531.522:1622): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400042a300 a2=fc6 a3=0 items=0 ppid=2530 pid=6062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:18:51.522000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:18:51.563449 kernel: audit: type=1327 audit(1734099531.522:1622): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:18:51.522000 audit[6062]: AVC avc: denied { watch } for pid=6062 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:51.573059 kernel: audit: type=1400 audit(1734099531.522:1623): avc: denied { watch } for pid=6062 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:51.522000 audit[6062]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40004dbdc0 a2=fc6 a3=0 items=0 ppid=2530 pid=6062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:18:51.586565 kernel: audit: type=1300 audit(1734099531.522:1623): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40004dbdc0 a2=fc6 a3=0 items=0 ppid=2530 pid=6062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c732 key=(null) Dec 13 14:18:51.522000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:18:51.596860 kernel: audit: type=1327 audit(1734099531.522:1623): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:18:51.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.604998 kernel: audit: type=1400 audit(1734099531.574:1624): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.612706 kernel: audit: type=1400 audit(1734099531.574:1625): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.586000 audit: BPF prog-id=222 op=LOAD Dec 13 14:18:51.597000 audit[6112]: AVC avc: denied { bpf } for pid=6112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.597000 audit[6112]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=2500 pid=6112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:51.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565653039306262613431383966306636373534636233386233613538 Dec 13 14:18:51.597000 audit[6112]: AVC avc: denied { perfmon } for pid=6112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.597000 audit[6112]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2500 pid=6112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:51.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565653039306262613431383966306636373534636233386233613538 Dec 13 14:18:51.597000 audit[6112]: AVC avc: denied { bpf } for pid=6112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.597000 audit[6112]: AVC avc: denied { bpf } for pid=6112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.597000 audit[6112]: AVC avc: denied { bpf } for pid=6112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.597000 audit[6112]: AVC avc: denied { perfmon } for pid=6112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.597000 audit[6112]: AVC avc: denied { perfmon } for pid=6112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.597000 audit[6112]: AVC avc: denied { perfmon } for pid=6112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.597000 audit[6112]: AVC avc: denied { perfmon } for pid=6112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.597000 audit[6112]: AVC avc: denied { perfmon } for pid=6112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.597000 audit[6112]: AVC avc: denied { bpf } for pid=6112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.597000 audit[6112]: AVC avc: denied { bpf } for pid=6112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.597000 audit: BPF prog-id=223 op=LOAD Dec 13 14:18:51.597000 audit[6112]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2500 pid=6112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:51.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565653039306262613431383966306636373534636233386233613538 Dec 13 14:18:51.597000 audit[6112]: AVC avc: denied { bpf } for pid=6112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.597000 audit[6112]: AVC avc: denied { bpf } for pid=6112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.597000 audit[6112]: AVC avc: denied { perfmon } for pid=6112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.597000 audit[6112]: AVC avc: denied { perfmon } for pid=6112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.597000 audit[6112]: AVC avc: denied { perfmon } for pid=6112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.597000 audit[6112]: AVC avc: denied { perfmon } for pid=6112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.597000 audit[6112]: AVC avc: denied { perfmon } for pid=6112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.597000 audit[6112]: AVC avc: denied { bpf } for pid=6112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.597000 audit[6112]: AVC avc: denied { bpf } for pid=6112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.597000 audit: BPF prog-id=224 op=LOAD Dec 13 14:18:51.597000 audit[6112]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2500 pid=6112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:51.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565653039306262613431383966306636373534636233386233613538 Dec 13 14:18:51.604000 audit: BPF prog-id=224 op=UNLOAD Dec 13 14:18:51.604000 audit: BPF prog-id=223 op=UNLOAD Dec 13 14:18:51.605000 audit[6112]: AVC avc: denied { bpf } for pid=6112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.605000 audit[6112]: AVC avc: denied { bpf } for pid=6112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.605000 audit[6112]: AVC avc: denied { bpf } for pid=6112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.605000 audit[6112]: AVC avc: denied { perfmon } for pid=6112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.605000 audit[6112]: AVC avc: denied { perfmon } for pid=6112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.605000 audit[6112]: AVC avc: denied { perfmon } for pid=6112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.605000 audit[6112]: AVC avc: denied { perfmon } for pid=6112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.605000 audit[6112]: AVC avc: denied { perfmon } for pid=6112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.605000 audit[6112]: AVC avc: denied { bpf } for pid=6112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.605000 audit[6112]: AVC avc: denied { bpf } for pid=6112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:51.605000 audit: BPF prog-id=225 op=LOAD Dec 13 14:18:51.605000 audit[6112]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2500 pid=6112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:51.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565653039306262613431383966306636373534636233386233613538 Dec 13 14:18:51.669411 env[1824]: time="2024-12-13T14:18:51.669347602Z" level=info msg="StartContainer for \"eee090bba4189f0f6754cb38b3a583d4415ba687f1ea4e81dd84356368f60b53\" returns successfully" Dec 13 14:18:52.167077 kubelet[2897]: E1213 14:18:52.167016 2897 controller.go:195] "Failed to update lease" err="Put \"https://172.31.24.217:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-24-217?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 13 14:18:56.081505 systemd[1]: run-containerd-runc-k8s.io-74f63f35032d795d5e97e52ecc429652693ae5b4fd5bc49a4225b2186ab929c9-runc.PcAcN7.mount: Deactivated successfully. Dec 13 14:19:00.143993 systemd[1]: run-containerd-runc-k8s.io-ba32901cf72a70b3cd1512697fbe4db89aaed9248d9e0a2c225edb89bdc0281e-runc.ByQafW.mount: Deactivated successfully. Dec 13 14:19:02.168687 kubelet[2897]: E1213 14:19:02.168604 2897 controller.go:195] "Failed to update lease" err="Put \"https://172.31.24.217:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-24-217?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)"