Dec 13 14:15:27.954430 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Dec 13 14:15:27.954466 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Dec 13 12:58:58 -00 2024 Dec 13 14:15:27.954489 kernel: efi: EFI v2.70 by EDK II Dec 13 14:15:27.954505 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7b003a98 MEMRESERVE=0x7171cf98 Dec 13 14:15:27.954519 kernel: ACPI: Early table checksum verification disabled Dec 13 14:15:27.954533 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Dec 13 14:15:27.954550 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Dec 13 14:15:27.954564 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Dec 13 14:15:27.954579 kernel: ACPI: DSDT 0x0000000078640000 00159D (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Dec 13 14:15:27.954593 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Dec 13 14:15:27.954611 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Dec 13 14:15:27.954627 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Dec 13 14:15:27.954641 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Dec 13 14:15:27.954656 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Dec 13 14:15:27.954673 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Dec 13 14:15:27.954693 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Dec 13 14:15:27.954707 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Dec 13 14:15:27.954722 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Dec 13 14:15:27.954737 kernel: printk: bootconsole [uart0] enabled Dec 13 14:15:27.954752 kernel: NUMA: Failed to initialise from firmware Dec 13 14:15:27.954767 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Dec 13 14:15:27.954782 kernel: NUMA: NODE_DATA [mem 0x4b5843900-0x4b5848fff] Dec 13 14:15:27.954797 kernel: Zone ranges: Dec 13 14:15:27.954813 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Dec 13 14:15:27.954827 kernel: DMA32 empty Dec 13 14:15:27.954842 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Dec 13 14:15:27.954861 kernel: Movable zone start for each node Dec 13 14:15:27.954877 kernel: Early memory node ranges Dec 13 14:15:27.954892 kernel: node 0: [mem 0x0000000040000000-0x000000007862ffff] Dec 13 14:15:27.954907 kernel: node 0: [mem 0x0000000078630000-0x000000007863ffff] Dec 13 14:15:27.954921 kernel: node 0: [mem 0x0000000078640000-0x00000000786effff] Dec 13 14:15:27.954936 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Dec 13 14:15:27.954951 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Dec 13 14:15:27.954965 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Dec 13 14:15:27.954980 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Dec 13 14:15:27.954995 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Dec 13 14:15:27.955009 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Dec 13 14:15:27.955024 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Dec 13 14:15:27.955043 kernel: psci: probing for conduit method from ACPI. Dec 13 14:15:27.955058 kernel: psci: PSCIv1.0 detected in firmware. Dec 13 14:15:27.955079 kernel: psci: Using standard PSCI v0.2 function IDs Dec 13 14:15:27.955163 kernel: psci: Trusted OS migration not required Dec 13 14:15:27.955187 kernel: psci: SMC Calling Convention v1.1 Dec 13 14:15:27.955210 kernel: ACPI: SRAT not present Dec 13 14:15:27.955227 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Dec 13 14:15:27.955243 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Dec 13 14:15:27.955260 kernel: pcpu-alloc: [0] 0 [0] 1 Dec 13 14:15:27.955276 kernel: Detected PIPT I-cache on CPU0 Dec 13 14:15:27.955292 kernel: CPU features: detected: GIC system register CPU interface Dec 13 14:15:27.956722 kernel: CPU features: detected: Spectre-v2 Dec 13 14:15:27.956742 kernel: CPU features: detected: Spectre-v3a Dec 13 14:15:27.956758 kernel: CPU features: detected: Spectre-BHB Dec 13 14:15:27.956774 kernel: CPU features: kernel page table isolation forced ON by KASLR Dec 13 14:15:27.956790 kernel: CPU features: detected: Kernel page table isolation (KPTI) Dec 13 14:15:27.956811 kernel: CPU features: detected: ARM erratum 1742098 Dec 13 14:15:27.956827 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Dec 13 14:15:27.956843 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Dec 13 14:15:27.956858 kernel: Policy zone: Normal Dec 13 14:15:27.956876 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 14:15:27.956893 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:15:27.956909 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:15:27.956925 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:15:27.956941 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:15:27.956957 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Dec 13 14:15:27.956977 kernel: Memory: 3824524K/4030464K available (9792K kernel code, 2092K rwdata, 7576K rodata, 36416K init, 777K bss, 205940K reserved, 0K cma-reserved) Dec 13 14:15:27.956994 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:15:27.957009 kernel: trace event string verifier disabled Dec 13 14:15:27.957025 kernel: rcu: Preemptible hierarchical RCU implementation. Dec 13 14:15:27.957041 kernel: rcu: RCU event tracing is enabled. Dec 13 14:15:27.957057 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:15:27.957074 kernel: Trampoline variant of Tasks RCU enabled. Dec 13 14:15:27.957090 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:15:27.957133 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:15:27.957150 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:15:27.957166 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Dec 13 14:15:27.957181 kernel: GICv3: 96 SPIs implemented Dec 13 14:15:27.957202 kernel: GICv3: 0 Extended SPIs implemented Dec 13 14:15:27.957218 kernel: GICv3: Distributor has no Range Selector support Dec 13 14:15:27.957234 kernel: Root IRQ handler: gic_handle_irq Dec 13 14:15:27.957249 kernel: GICv3: 16 PPIs implemented Dec 13 14:15:27.957265 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Dec 13 14:15:27.957280 kernel: ACPI: SRAT not present Dec 13 14:15:27.957296 kernel: ITS [mem 0x10080000-0x1009ffff] Dec 13 14:15:27.957312 kernel: ITS@0x0000000010080000: allocated 8192 Devices @400090000 (indirect, esz 8, psz 64K, shr 1) Dec 13 14:15:27.957328 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000a0000 (flat, esz 8, psz 64K, shr 1) Dec 13 14:15:27.957344 kernel: GICv3: using LPI property table @0x00000004000b0000 Dec 13 14:15:27.957359 kernel: ITS: Using hypervisor restricted LPI range [128] Dec 13 14:15:27.957379 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Dec 13 14:15:27.957395 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Dec 13 14:15:27.957411 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Dec 13 14:15:27.957427 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Dec 13 14:15:27.957443 kernel: Console: colour dummy device 80x25 Dec 13 14:15:27.957459 kernel: printk: console [tty1] enabled Dec 13 14:15:27.957475 kernel: ACPI: Core revision 20210730 Dec 13 14:15:27.957492 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Dec 13 14:15:27.957508 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:15:27.957525 kernel: LSM: Security Framework initializing Dec 13 14:15:27.957544 kernel: SELinux: Initializing. Dec 13 14:15:27.957561 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:15:27.957578 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:15:27.957594 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:15:27.957610 kernel: Platform MSI: ITS@0x10080000 domain created Dec 13 14:15:27.957626 kernel: PCI/MSI: ITS@0x10080000 domain created Dec 13 14:15:27.957642 kernel: Remapping and enabling EFI services. Dec 13 14:15:27.957658 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:15:27.957674 kernel: Detected PIPT I-cache on CPU1 Dec 13 14:15:27.957690 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Dec 13 14:15:27.957711 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Dec 13 14:15:27.957727 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Dec 13 14:15:27.957743 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:15:27.957759 kernel: SMP: Total of 2 processors activated. Dec 13 14:15:27.957775 kernel: CPU features: detected: 32-bit EL0 Support Dec 13 14:15:27.957791 kernel: CPU features: detected: 32-bit EL1 Support Dec 13 14:15:27.957807 kernel: CPU features: detected: CRC32 instructions Dec 13 14:15:27.957823 kernel: CPU: All CPU(s) started at EL1 Dec 13 14:15:27.957838 kernel: alternatives: patching kernel code Dec 13 14:15:27.957858 kernel: devtmpfs: initialized Dec 13 14:15:27.957875 kernel: KASLR disabled due to lack of seed Dec 13 14:15:27.957901 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:15:27.957922 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:15:27.957939 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:15:27.957955 kernel: SMBIOS 3.0.0 present. Dec 13 14:15:27.957971 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Dec 13 14:15:27.957988 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:15:27.958005 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Dec 13 14:15:27.958022 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Dec 13 14:15:27.958040 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Dec 13 14:15:27.958061 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:15:27.958078 kernel: audit: type=2000 audit(0.269:1): state=initialized audit_enabled=0 res=1 Dec 13 14:15:27.958112 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:15:27.958144 kernel: cpuidle: using governor menu Dec 13 14:15:27.958167 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Dec 13 14:15:27.958189 kernel: ASID allocator initialised with 32768 entries Dec 13 14:15:27.958206 kernel: ACPI: bus type PCI registered Dec 13 14:15:27.958223 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:15:27.958239 kernel: Serial: AMBA PL011 UART driver Dec 13 14:15:27.958256 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:15:27.958273 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Dec 13 14:15:27.958290 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:15:27.958306 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Dec 13 14:15:27.958323 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:15:27.958344 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Dec 13 14:15:27.958361 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:15:27.958377 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:15:27.958394 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:15:27.958410 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:15:27.958427 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:15:27.958443 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:15:27.958460 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:15:27.958476 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:15:27.958497 kernel: ACPI: Interpreter enabled Dec 13 14:15:27.958514 kernel: ACPI: Using GIC for interrupt routing Dec 13 14:15:27.958530 kernel: ACPI: MCFG table detected, 1 entries Dec 13 14:15:27.958547 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Dec 13 14:15:27.958860 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:15:27.959060 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Dec 13 14:15:27.959291 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Dec 13 14:15:27.959482 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Dec 13 14:15:27.959675 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Dec 13 14:15:27.959698 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Dec 13 14:15:27.959715 kernel: acpiphp: Slot [1] registered Dec 13 14:15:27.959732 kernel: acpiphp: Slot [2] registered Dec 13 14:15:27.959748 kernel: acpiphp: Slot [3] registered Dec 13 14:15:27.959764 kernel: acpiphp: Slot [4] registered Dec 13 14:15:27.959781 kernel: acpiphp: Slot [5] registered Dec 13 14:15:27.959798 kernel: acpiphp: Slot [6] registered Dec 13 14:15:27.959814 kernel: acpiphp: Slot [7] registered Dec 13 14:15:27.959835 kernel: acpiphp: Slot [8] registered Dec 13 14:15:27.959867 kernel: acpiphp: Slot [9] registered Dec 13 14:15:27.959885 kernel: acpiphp: Slot [10] registered Dec 13 14:15:27.959902 kernel: acpiphp: Slot [11] registered Dec 13 14:15:27.959918 kernel: acpiphp: Slot [12] registered Dec 13 14:15:27.959935 kernel: acpiphp: Slot [13] registered Dec 13 14:15:27.959967 kernel: acpiphp: Slot [14] registered Dec 13 14:15:27.959985 kernel: acpiphp: Slot [15] registered Dec 13 14:15:27.960001 kernel: acpiphp: Slot [16] registered Dec 13 14:15:27.960022 kernel: acpiphp: Slot [17] registered Dec 13 14:15:27.960054 kernel: acpiphp: Slot [18] registered Dec 13 14:15:27.960071 kernel: acpiphp: Slot [19] registered Dec 13 14:15:27.960088 kernel: acpiphp: Slot [20] registered Dec 13 14:15:27.960124 kernel: acpiphp: Slot [21] registered Dec 13 14:15:27.960141 kernel: acpiphp: Slot [22] registered Dec 13 14:15:27.960158 kernel: acpiphp: Slot [23] registered Dec 13 14:15:27.960175 kernel: acpiphp: Slot [24] registered Dec 13 14:15:27.960191 kernel: acpiphp: Slot [25] registered Dec 13 14:15:27.960207 kernel: acpiphp: Slot [26] registered Dec 13 14:15:27.960229 kernel: acpiphp: Slot [27] registered Dec 13 14:15:27.960245 kernel: acpiphp: Slot [28] registered Dec 13 14:15:27.960262 kernel: acpiphp: Slot [29] registered Dec 13 14:15:27.960278 kernel: acpiphp: Slot [30] registered Dec 13 14:15:27.960294 kernel: acpiphp: Slot [31] registered Dec 13 14:15:27.960311 kernel: PCI host bridge to bus 0000:00 Dec 13 14:15:27.960528 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Dec 13 14:15:27.960708 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Dec 13 14:15:27.960885 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Dec 13 14:15:27.961057 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Dec 13 14:15:27.961314 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Dec 13 14:15:27.961532 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Dec 13 14:15:27.961736 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Dec 13 14:15:27.961954 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Dec 13 14:15:27.962192 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Dec 13 14:15:27.962394 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 14:15:27.962606 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Dec 13 14:15:27.962805 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Dec 13 14:15:27.963003 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Dec 13 14:15:27.972329 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Dec 13 14:15:27.972555 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 14:15:27.972763 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Dec 13 14:15:27.972961 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Dec 13 14:15:27.973643 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Dec 13 14:15:27.973861 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Dec 13 14:15:27.974062 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Dec 13 14:15:27.974269 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Dec 13 14:15:27.974446 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Dec 13 14:15:27.974627 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Dec 13 14:15:27.974651 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Dec 13 14:15:27.974669 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Dec 13 14:15:27.974686 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Dec 13 14:15:27.974703 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Dec 13 14:15:27.974720 kernel: iommu: Default domain type: Translated Dec 13 14:15:27.974737 kernel: iommu: DMA domain TLB invalidation policy: strict mode Dec 13 14:15:27.974754 kernel: vgaarb: loaded Dec 13 14:15:27.974770 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:15:27.974792 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:15:27.974809 kernel: PTP clock support registered Dec 13 14:15:27.974826 kernel: Registered efivars operations Dec 13 14:15:27.974842 kernel: clocksource: Switched to clocksource arch_sys_counter Dec 13 14:15:27.974859 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:15:27.974876 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:15:27.974893 kernel: pnp: PnP ACPI init Dec 13 14:15:27.975133 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Dec 13 14:15:27.975165 kernel: pnp: PnP ACPI: found 1 devices Dec 13 14:15:27.975183 kernel: NET: Registered PF_INET protocol family Dec 13 14:15:27.975201 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:15:27.975218 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 14:15:27.975235 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:15:27.975252 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:15:27.975270 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 14:15:27.988148 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 14:15:27.988184 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:15:27.988213 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:15:27.988231 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:15:27.988249 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:15:27.988266 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Dec 13 14:15:27.988282 kernel: kvm [1]: HYP mode not available Dec 13 14:15:27.988299 kernel: Initialise system trusted keyrings Dec 13 14:15:27.988317 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 14:15:27.988333 kernel: Key type asymmetric registered Dec 13 14:15:27.988350 kernel: Asymmetric key parser 'x509' registered Dec 13 14:15:27.988370 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:15:27.988388 kernel: io scheduler mq-deadline registered Dec 13 14:15:27.988404 kernel: io scheduler kyber registered Dec 13 14:15:27.988420 kernel: io scheduler bfq registered Dec 13 14:15:27.988681 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Dec 13 14:15:27.988708 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Dec 13 14:15:27.988725 kernel: ACPI: button: Power Button [PWRB] Dec 13 14:15:27.988742 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input1 Dec 13 14:15:27.988764 kernel: ACPI: button: Sleep Button [SLPB] Dec 13 14:15:27.988781 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:15:27.988799 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Dec 13 14:15:27.988996 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Dec 13 14:15:27.989021 kernel: printk: console [ttyS0] disabled Dec 13 14:15:27.989038 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Dec 13 14:15:27.989055 kernel: printk: console [ttyS0] enabled Dec 13 14:15:27.989072 kernel: printk: bootconsole [uart0] disabled Dec 13 14:15:27.989088 kernel: thunder_xcv, ver 1.0 Dec 13 14:15:27.992259 kernel: thunder_bgx, ver 1.0 Dec 13 14:15:27.992288 kernel: nicpf, ver 1.0 Dec 13 14:15:27.992306 kernel: nicvf, ver 1.0 Dec 13 14:15:27.992599 kernel: rtc-efi rtc-efi.0: registered as rtc0 Dec 13 14:15:27.992797 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-12-13T14:15:27 UTC (1734099327) Dec 13 14:15:27.992825 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 14:15:27.992843 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:15:27.992860 kernel: Segment Routing with IPv6 Dec 13 14:15:27.992877 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:15:27.992902 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:15:27.992920 kernel: Key type dns_resolver registered Dec 13 14:15:27.992937 kernel: registered taskstats version 1 Dec 13 14:15:27.992954 kernel: Loading compiled-in X.509 certificates Dec 13 14:15:27.992971 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e011ba9949ade5a6d03f7a5e28171f7f59e70f8a' Dec 13 14:15:27.992988 kernel: Key type .fscrypt registered Dec 13 14:15:27.993005 kernel: Key type fscrypt-provisioning registered Dec 13 14:15:27.993021 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:15:27.996041 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:15:27.996079 kernel: ima: No architecture policies found Dec 13 14:15:27.996126 kernel: clk: Disabling unused clocks Dec 13 14:15:27.996147 kernel: Freeing unused kernel memory: 36416K Dec 13 14:15:27.996164 kernel: Run /init as init process Dec 13 14:15:27.996181 kernel: with arguments: Dec 13 14:15:27.996198 kernel: /init Dec 13 14:15:27.996214 kernel: with environment: Dec 13 14:15:27.996230 kernel: HOME=/ Dec 13 14:15:27.996247 kernel: TERM=linux Dec 13 14:15:27.996269 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:15:27.996291 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:15:27.996313 systemd[1]: Detected virtualization amazon. Dec 13 14:15:27.996332 systemd[1]: Detected architecture arm64. Dec 13 14:15:27.996350 systemd[1]: Running in initrd. Dec 13 14:15:27.996368 systemd[1]: No hostname configured, using default hostname. Dec 13 14:15:27.996386 systemd[1]: Hostname set to . Dec 13 14:15:27.996408 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:15:27.996427 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:15:27.996445 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:15:27.996462 systemd[1]: Reached target cryptsetup.target. Dec 13 14:15:27.996480 systemd[1]: Reached target paths.target. Dec 13 14:15:27.996498 systemd[1]: Reached target slices.target. Dec 13 14:15:27.996516 systemd[1]: Reached target swap.target. Dec 13 14:15:27.996534 systemd[1]: Reached target timers.target. Dec 13 14:15:27.996557 systemd[1]: Listening on iscsid.socket. Dec 13 14:15:27.996575 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:15:27.996593 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:15:27.996629 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:15:27.996648 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:15:27.996667 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:15:27.996685 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:15:27.996704 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:15:27.996728 systemd[1]: Reached target sockets.target. Dec 13 14:15:27.996747 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:15:27.996765 systemd[1]: Finished network-cleanup.service. Dec 13 14:15:27.996783 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:15:27.996801 systemd[1]: Starting systemd-journald.service... Dec 13 14:15:27.996819 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:15:27.996838 systemd[1]: Starting systemd-resolved.service... Dec 13 14:15:27.996857 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:15:27.996876 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:15:27.996899 kernel: audit: type=1130 audit(1734099327.942:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.996919 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:15:27.996937 kernel: audit: type=1130 audit(1734099327.956:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.996955 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:15:27.996973 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:15:27.996991 kernel: audit: type=1130 audit(1734099327.970:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.997009 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:15:27.997031 systemd-journald[309]: Journal started Dec 13 14:15:27.997155 systemd-journald[309]: Runtime Journal (/run/log/journal/ec25a62c0fd2d93be3163011b0947228) is 8.0M, max 75.4M, 67.4M free. Dec 13 14:15:27.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:27.966891 systemd-modules-load[310]: Inserted module 'overlay' Dec 13 14:15:28.015864 systemd[1]: Started systemd-journald.service. Dec 13 14:15:28.015935 kernel: audit: type=1130 audit(1734099328.007:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:28.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:28.019871 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:15:28.036120 kernel: audit: type=1130 audit(1734099328.022:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:28.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:28.050133 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:15:28.058697 systemd-modules-load[310]: Inserted module 'br_netfilter' Dec 13 14:15:28.060400 kernel: Bridge firewalling registered Dec 13 14:15:28.064505 systemd-resolved[311]: Positive Trust Anchors: Dec 13 14:15:28.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:28.064540 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:15:28.068313 systemd-resolved[311]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:15:28.068373 systemd-resolved[311]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:15:28.096138 kernel: audit: type=1130 audit(1734099328.065:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:28.075461 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:15:28.105137 kernel: SCSI subsystem initialized Dec 13 14:15:28.120462 dracut-cmdline[326]: dracut-dracut-053 Dec 13 14:15:28.131159 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:15:28.131237 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:15:28.134765 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:15:28.135018 dracut-cmdline[326]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 14:15:28.153423 systemd-modules-load[310]: Inserted module 'dm_multipath' Dec 13 14:15:28.156068 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:15:28.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:28.169246 kernel: audit: type=1130 audit(1734099328.158:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:28.166767 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:15:28.194940 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:15:28.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:28.208146 kernel: audit: type=1130 audit(1734099328.195:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:28.318145 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:15:28.337140 kernel: iscsi: registered transport (tcp) Dec 13 14:15:28.364962 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:15:28.365033 kernel: QLogic iSCSI HBA Driver Dec 13 14:15:28.545949 systemd-resolved[311]: Defaulting to hostname 'linux'. Dec 13 14:15:28.548142 kernel: random: crng init done Dec 13 14:15:28.550146 systemd[1]: Started systemd-resolved.service. Dec 13 14:15:28.561883 kernel: audit: type=1130 audit(1734099328.550:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:28.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:28.552005 systemd[1]: Reached target nss-lookup.target. Dec 13 14:15:28.574049 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:15:28.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:28.578711 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:15:28.648154 kernel: raid6: neonx8 gen() 6259 MB/s Dec 13 14:15:28.666145 kernel: raid6: neonx8 xor() 4548 MB/s Dec 13 14:15:28.684145 kernel: raid6: neonx4 gen() 6471 MB/s Dec 13 14:15:28.702146 kernel: raid6: neonx4 xor() 4734 MB/s Dec 13 14:15:28.720146 kernel: raid6: neonx2 gen() 5748 MB/s Dec 13 14:15:28.738144 kernel: raid6: neonx2 xor() 4299 MB/s Dec 13 14:15:28.756144 kernel: raid6: neonx1 gen() 4416 MB/s Dec 13 14:15:28.774144 kernel: raid6: neonx1 xor() 3494 MB/s Dec 13 14:15:28.792147 kernel: raid6: int64x8 gen() 3401 MB/s Dec 13 14:15:28.810152 kernel: raid6: int64x8 xor() 2040 MB/s Dec 13 14:15:28.828150 kernel: raid6: int64x4 gen() 3660 MB/s Dec 13 14:15:28.846148 kernel: raid6: int64x4 xor() 2082 MB/s Dec 13 14:15:28.864142 kernel: raid6: int64x2 gen() 3514 MB/s Dec 13 14:15:28.882144 kernel: raid6: int64x2 xor() 1915 MB/s Dec 13 14:15:28.900146 kernel: raid6: int64x1 gen() 2736 MB/s Dec 13 14:15:28.919552 kernel: raid6: int64x1 xor() 1421 MB/s Dec 13 14:15:28.919628 kernel: raid6: using algorithm neonx4 gen() 6471 MB/s Dec 13 14:15:28.919655 kernel: raid6: .... xor() 4734 MB/s, rmw enabled Dec 13 14:15:28.921289 kernel: raid6: using neon recovery algorithm Dec 13 14:15:28.940145 kernel: xor: measuring software checksum speed Dec 13 14:15:28.942141 kernel: 8regs : 8685 MB/sec Dec 13 14:15:28.942215 kernel: 32regs : 10379 MB/sec Dec 13 14:15:28.945475 kernel: arm64_neon : 9240 MB/sec Dec 13 14:15:28.945545 kernel: xor: using function: 32regs (10379 MB/sec) Dec 13 14:15:29.041150 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Dec 13 14:15:29.061404 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:15:29.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:29.064000 audit: BPF prog-id=7 op=LOAD Dec 13 14:15:29.064000 audit: BPF prog-id=8 op=LOAD Dec 13 14:15:29.066350 systemd[1]: Starting systemd-udevd.service... Dec 13 14:15:29.095625 systemd-udevd[510]: Using default interface naming scheme 'v252'. Dec 13 14:15:29.106718 systemd[1]: Started systemd-udevd.service. Dec 13 14:15:29.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:29.114318 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:15:29.145012 dracut-pre-trigger[520]: rd.md=0: removing MD RAID activation Dec 13 14:15:29.211510 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:15:29.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:29.216459 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:15:29.322580 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:15:29.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:29.468206 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Dec 13 14:15:29.468293 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Dec 13 14:15:29.487303 kernel: ena 0000:00:05.0: ENA device version: 0.10 Dec 13 14:15:29.487596 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Dec 13 14:15:29.487845 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:29:31:4b:27:73 Dec 13 14:15:29.489703 (udev-worker)[555]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:15:29.493763 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Dec 13 14:15:29.496156 kernel: nvme nvme0: pci function 0000:00:04.0 Dec 13 14:15:29.506147 kernel: nvme nvme0: 2/0/0 default/read/poll queues Dec 13 14:15:29.516822 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:15:29.516901 kernel: GPT:9289727 != 16777215 Dec 13 14:15:29.516927 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:15:29.518876 kernel: GPT:9289727 != 16777215 Dec 13 14:15:29.520110 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:15:29.523322 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:15:29.602140 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (557) Dec 13 14:15:29.687043 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:15:29.713893 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:15:29.744330 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:15:29.753439 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:15:29.761599 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:15:29.766662 systemd[1]: Starting disk-uuid.service... Dec 13 14:15:29.778526 disk-uuid[670]: Primary Header is updated. Dec 13 14:15:29.778526 disk-uuid[670]: Secondary Entries is updated. Dec 13 14:15:29.778526 disk-uuid[670]: Secondary Header is updated. Dec 13 14:15:29.788122 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:15:29.798135 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:15:29.807153 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:15:30.809550 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:15:30.809620 disk-uuid[671]: The operation has completed successfully. Dec 13 14:15:30.991010 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:15:30.993471 systemd[1]: Finished disk-uuid.service. Dec 13 14:15:30.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:30.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:31.027910 systemd[1]: Starting verity-setup.service... Dec 13 14:15:31.068192 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Dec 13 14:15:31.171938 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:15:31.178365 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:15:31.185180 systemd[1]: Finished verity-setup.service. Dec 13 14:15:31.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:31.282142 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:15:31.283493 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:15:31.286728 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:15:31.290932 systemd[1]: Starting ignition-setup.service... Dec 13 14:15:31.308674 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:15:31.329160 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:15:31.329250 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:15:31.329276 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:15:31.342158 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:15:31.364684 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:15:31.384087 systemd[1]: Finished ignition-setup.service. Dec 13 14:15:31.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:31.388848 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:15:31.495239 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:15:31.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:31.498000 audit: BPF prog-id=9 op=LOAD Dec 13 14:15:31.501249 systemd[1]: Starting systemd-networkd.service... Dec 13 14:15:31.553313 systemd-networkd[1183]: lo: Link UP Dec 13 14:15:31.553337 systemd-networkd[1183]: lo: Gained carrier Dec 13 14:15:31.557168 systemd-networkd[1183]: Enumeration completed Dec 13 14:15:31.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:31.557357 systemd[1]: Started systemd-networkd.service. Dec 13 14:15:31.560415 systemd[1]: Reached target network.target. Dec 13 14:15:31.566160 systemd[1]: Starting iscsiuio.service... Dec 13 14:15:31.566370 systemd-networkd[1183]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:15:31.576307 systemd-networkd[1183]: eth0: Link UP Dec 13 14:15:31.577474 systemd-networkd[1183]: eth0: Gained carrier Dec 13 14:15:31.585838 systemd[1]: Started iscsiuio.service. Dec 13 14:15:31.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:31.590687 systemd[1]: Starting iscsid.service... Dec 13 14:15:31.602160 iscsid[1188]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:15:31.602160 iscsid[1188]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:15:31.602160 iscsid[1188]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:15:31.602160 iscsid[1188]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:15:31.602160 iscsid[1188]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:15:31.602160 iscsid[1188]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:15:31.620239 systemd[1]: Started iscsid.service. Dec 13 14:15:31.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:31.628797 systemd-networkd[1183]: eth0: DHCPv4 address 172.31.31.121/20, gateway 172.31.16.1 acquired from 172.31.16.1 Dec 13 14:15:31.634401 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:15:31.660888 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:15:31.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:31.664228 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:15:31.665953 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:15:31.669026 systemd[1]: Reached target remote-fs.target. Dec 13 14:15:31.675244 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:15:31.697665 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:15:31.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:32.274813 ignition[1106]: Ignition 2.14.0 Dec 13 14:15:32.275474 ignition[1106]: Stage: fetch-offline Dec 13 14:15:32.275929 ignition[1106]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:32.276010 ignition[1106]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:32.299361 ignition[1106]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:32.300456 ignition[1106]: Ignition finished successfully Dec 13 14:15:32.305332 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:15:32.318184 kernel: kauditd_printk_skb: 18 callbacks suppressed Dec 13 14:15:32.319488 kernel: audit: type=1130 audit(1734099332.306:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:32.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:32.310338 systemd[1]: Starting ignition-fetch.service... Dec 13 14:15:32.326667 ignition[1207]: Ignition 2.14.0 Dec 13 14:15:32.326700 ignition[1207]: Stage: fetch Dec 13 14:15:32.327057 ignition[1207]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:32.327175 ignition[1207]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:32.348604 ignition[1207]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:32.351167 ignition[1207]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:32.362637 ignition[1207]: INFO : PUT result: OK Dec 13 14:15:32.367630 ignition[1207]: DEBUG : parsed url from cmdline: "" Dec 13 14:15:32.369462 ignition[1207]: INFO : no config URL provided Dec 13 14:15:32.371160 ignition[1207]: INFO : reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:15:32.371160 ignition[1207]: INFO : no config at "/usr/lib/ignition/user.ign" Dec 13 14:15:32.371160 ignition[1207]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:32.377973 ignition[1207]: INFO : PUT result: OK Dec 13 14:15:32.379541 ignition[1207]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Dec 13 14:15:32.382969 ignition[1207]: INFO : GET result: OK Dec 13 14:15:32.384543 ignition[1207]: DEBUG : parsing config with SHA512: 4e64ce7068aeb62f73c0b1efc868896d9f67e1a29ae0636c5031e44be14802d7dc0ceb2db93435f91dd0ec7cab1d5ef109cbc356caa92d86379cfbe18dbd7ab0 Dec 13 14:15:32.395595 unknown[1207]: fetched base config from "system" Dec 13 14:15:32.395625 unknown[1207]: fetched base config from "system" Dec 13 14:15:32.395641 unknown[1207]: fetched user config from "aws" Dec 13 14:15:32.401536 ignition[1207]: fetch: fetch complete Dec 13 14:15:32.401571 ignition[1207]: fetch: fetch passed Dec 13 14:15:32.401706 ignition[1207]: Ignition finished successfully Dec 13 14:15:32.407995 systemd[1]: Finished ignition-fetch.service. Dec 13 14:15:32.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:32.412600 systemd[1]: Starting ignition-kargs.service... Dec 13 14:15:32.421330 kernel: audit: type=1130 audit(1734099332.409:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:32.435309 ignition[1213]: Ignition 2.14.0 Dec 13 14:15:32.435339 ignition[1213]: Stage: kargs Dec 13 14:15:32.435676 ignition[1213]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:32.435742 ignition[1213]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:32.451235 ignition[1213]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:32.453735 ignition[1213]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:32.457325 ignition[1213]: INFO : PUT result: OK Dec 13 14:15:32.462930 ignition[1213]: kargs: kargs passed Dec 13 14:15:32.463344 ignition[1213]: Ignition finished successfully Dec 13 14:15:32.467852 systemd[1]: Finished ignition-kargs.service. Dec 13 14:15:32.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:32.473434 systemd[1]: Starting ignition-disks.service... Dec 13 14:15:32.482775 kernel: audit: type=1130 audit(1734099332.469:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:32.490688 ignition[1219]: Ignition 2.14.0 Dec 13 14:15:32.490720 ignition[1219]: Stage: disks Dec 13 14:15:32.491127 ignition[1219]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:32.491205 ignition[1219]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:32.505940 ignition[1219]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:32.508139 ignition[1219]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:32.511337 ignition[1219]: INFO : PUT result: OK Dec 13 14:15:32.517451 ignition[1219]: disks: disks passed Dec 13 14:15:32.517600 ignition[1219]: Ignition finished successfully Dec 13 14:15:32.521908 systemd[1]: Finished ignition-disks.service. Dec 13 14:15:32.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:32.525052 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:15:32.535522 kernel: audit: type=1130 audit(1734099332.523:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:32.535734 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:15:32.539163 systemd[1]: Reached target local-fs.target. Dec 13 14:15:32.542412 systemd[1]: Reached target sysinit.target. Dec 13 14:15:32.545738 systemd[1]: Reached target basic.target. Dec 13 14:15:32.550372 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:15:32.594373 systemd-fsck[1227]: ROOT: clean, 621/553520 files, 56020/553472 blocks Dec 13 14:15:32.600056 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:15:32.604732 systemd[1]: Mounting sysroot.mount... Dec 13 14:15:32.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:32.614215 kernel: audit: type=1130 audit(1734099332.600:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:32.636752 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:15:32.637902 systemd[1]: Mounted sysroot.mount. Dec 13 14:15:32.640423 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:15:32.645678 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:15:32.649586 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:15:32.651533 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:15:32.651617 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:15:32.668152 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:15:32.674288 systemd-networkd[1183]: eth0: Gained IPv6LL Dec 13 14:15:32.688000 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:15:32.697242 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:15:32.709453 initrd-setup-root[1249]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:15:32.726176 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1244) Dec 13 14:15:32.731251 initrd-setup-root[1257]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:15:32.735501 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:15:32.735574 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:15:32.735600 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:15:32.746062 initrd-setup-root[1281]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:15:32.752158 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:15:32.758255 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:15:32.763766 initrd-setup-root[1291]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:15:32.949844 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:15:32.960020 kernel: audit: type=1130 audit(1734099332.950:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:32.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:32.953203 systemd[1]: Starting ignition-mount.service... Dec 13 14:15:32.964970 systemd[1]: Starting sysroot-boot.service... Dec 13 14:15:32.977797 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:15:32.977988 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:15:32.999638 ignition[1309]: INFO : Ignition 2.14.0 Dec 13 14:15:33.002035 ignition[1309]: INFO : Stage: mount Dec 13 14:15:33.004121 ignition[1309]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:33.006699 ignition[1309]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:33.028635 systemd[1]: Finished sysroot-boot.service. Dec 13 14:15:33.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:33.038155 kernel: audit: type=1130 audit(1734099333.030:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:33.045033 ignition[1309]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:33.047747 ignition[1309]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:33.050558 ignition[1309]: INFO : PUT result: OK Dec 13 14:15:33.056417 ignition[1309]: INFO : mount: mount passed Dec 13 14:15:33.058244 ignition[1309]: INFO : Ignition finished successfully Dec 13 14:15:33.061160 systemd[1]: Finished ignition-mount.service. Dec 13 14:15:33.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:33.065413 systemd[1]: Starting ignition-files.service... Dec 13 14:15:33.072761 kernel: audit: type=1130 audit(1734099333.060:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:33.082393 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:15:33.110156 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1319) Dec 13 14:15:33.116291 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:15:33.116363 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:15:33.116388 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:15:33.128137 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:15:33.133412 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:15:33.152982 ignition[1338]: INFO : Ignition 2.14.0 Dec 13 14:15:33.152982 ignition[1338]: INFO : Stage: files Dec 13 14:15:33.156285 ignition[1338]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:33.156285 ignition[1338]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:33.172753 ignition[1338]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:33.175202 ignition[1338]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:33.178393 ignition[1338]: INFO : PUT result: OK Dec 13 14:15:33.183191 ignition[1338]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:15:33.187522 ignition[1338]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:15:33.187522 ignition[1338]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:15:33.223056 ignition[1338]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:15:33.225795 ignition[1338]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:15:33.229609 unknown[1338]: wrote ssh authorized keys file for user: core Dec 13 14:15:33.232009 ignition[1338]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:15:33.235423 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Dec 13 14:15:33.239024 ignition[1338]: INFO : GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Dec 13 14:15:33.368576 ignition[1338]: INFO : GET result: OK Dec 13 14:15:33.573694 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Dec 13 14:15:33.573694 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Dec 13 14:15:33.584682 ignition[1338]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:15:33.589011 ignition[1338]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2652835638" Dec 13 14:15:33.595399 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1341) Dec 13 14:15:33.595440 ignition[1338]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2652835638": device or resource busy Dec 13 14:15:33.595440 ignition[1338]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2652835638", trying btrfs: device or resource busy Dec 13 14:15:33.595440 ignition[1338]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2652835638" Dec 13 14:15:33.595440 ignition[1338]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2652835638" Dec 13 14:15:33.607386 ignition[1338]: INFO : op(3): [started] unmounting "/mnt/oem2652835638" Dec 13 14:15:33.616584 ignition[1338]: INFO : op(3): [finished] unmounting "/mnt/oem2652835638" Dec 13 14:15:33.616584 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Dec 13 14:15:33.616584 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:15:33.616584 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:15:33.616584 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:15:33.616584 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:15:33.616584 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:15:33.616584 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:15:33.616584 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:15:33.616584 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:15:33.616584 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:15:33.616584 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:15:33.616584 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" Dec 13 14:15:33.616584 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" Dec 13 14:15:33.616584 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Dec 13 14:15:33.616584 ignition[1338]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:15:33.684475 ignition[1338]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2441585951" Dec 13 14:15:33.687196 ignition[1338]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2441585951": device or resource busy Dec 13 14:15:33.687196 ignition[1338]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2441585951", trying btrfs: device or resource busy Dec 13 14:15:33.687196 ignition[1338]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2441585951" Dec 13 14:15:33.696339 ignition[1338]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2441585951" Dec 13 14:15:33.696339 ignition[1338]: INFO : op(6): [started] unmounting "/mnt/oem2441585951" Dec 13 14:15:33.701244 ignition[1338]: INFO : op(6): [finished] unmounting "/mnt/oem2441585951" Dec 13 14:15:33.701244 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Dec 13 14:15:33.701244 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Dec 13 14:15:33.701244 ignition[1338]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:15:33.719717 systemd[1]: mnt-oem2441585951.mount: Deactivated successfully. Dec 13 14:15:33.737913 ignition[1338]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3617711214" Dec 13 14:15:33.740902 ignition[1338]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3617711214": device or resource busy Dec 13 14:15:33.740902 ignition[1338]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3617711214", trying btrfs: device or resource busy Dec 13 14:15:33.740902 ignition[1338]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3617711214" Dec 13 14:15:33.740902 ignition[1338]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3617711214" Dec 13 14:15:33.752753 ignition[1338]: INFO : op(9): [started] unmounting "/mnt/oem3617711214" Dec 13 14:15:33.752753 ignition[1338]: INFO : op(9): [finished] unmounting "/mnt/oem3617711214" Dec 13 14:15:33.752753 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Dec 13 14:15:33.762276 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:15:33.765827 ignition[1338]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:15:33.780738 ignition[1338]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2063541010" Dec 13 14:15:33.780738 ignition[1338]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2063541010": device or resource busy Dec 13 14:15:33.780738 ignition[1338]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2063541010", trying btrfs: device or resource busy Dec 13 14:15:33.780738 ignition[1338]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2063541010" Dec 13 14:15:33.792563 ignition[1338]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2063541010" Dec 13 14:15:33.792563 ignition[1338]: INFO : op(c): [started] unmounting "/mnt/oem2063541010" Dec 13 14:15:33.792563 ignition[1338]: INFO : op(c): [finished] unmounting "/mnt/oem2063541010" Dec 13 14:15:33.792563 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:15:33.792563 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" Dec 13 14:15:33.792563 ignition[1338]: INFO : GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-arm64.raw: attempt #1 Dec 13 14:15:34.187733 ignition[1338]: INFO : GET result: OK Dec 13 14:15:34.981985 ignition[1338]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" Dec 13 14:15:34.981985 ignition[1338]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:15:34.988828 ignition[1338]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:15:34.988828 ignition[1338]: INFO : files: op(10): [started] processing unit "amazon-ssm-agent.service" Dec 13 14:15:34.988828 ignition[1338]: INFO : files: op(10): op(11): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Dec 13 14:15:34.988828 ignition[1338]: INFO : files: op(10): op(11): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Dec 13 14:15:34.988828 ignition[1338]: INFO : files: op(10): [finished] processing unit "amazon-ssm-agent.service" Dec 13 14:15:34.988828 ignition[1338]: INFO : files: op(12): [started] processing unit "nvidia.service" Dec 13 14:15:34.988828 ignition[1338]: INFO : files: op(12): [finished] processing unit "nvidia.service" Dec 13 14:15:34.988828 ignition[1338]: INFO : files: op(13): [started] processing unit "prepare-helm.service" Dec 13 14:15:34.988828 ignition[1338]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:15:34.988828 ignition[1338]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:15:34.988828 ignition[1338]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" Dec 13 14:15:34.988828 ignition[1338]: INFO : files: op(15): [started] setting preset to enabled for "nvidia.service" Dec 13 14:15:34.988828 ignition[1338]: INFO : files: op(15): [finished] setting preset to enabled for "nvidia.service" Dec 13 14:15:34.988828 ignition[1338]: INFO : files: op(16): [started] setting preset to enabled for "prepare-helm.service" Dec 13 14:15:34.988828 ignition[1338]: INFO : files: op(16): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 14:15:34.988828 ignition[1338]: INFO : files: op(17): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:15:34.988828 ignition[1338]: INFO : files: op(17): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:15:34.988828 ignition[1338]: INFO : files: op(18): [started] setting preset to enabled for "amazon-ssm-agent.service" Dec 13 14:15:34.988828 ignition[1338]: INFO : files: op(18): [finished] setting preset to enabled for "amazon-ssm-agent.service" Dec 13 14:15:35.047153 ignition[1338]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:15:35.047153 ignition[1338]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:15:35.047153 ignition[1338]: INFO : files: files passed Dec 13 14:15:35.047153 ignition[1338]: INFO : Ignition finished successfully Dec 13 14:15:35.074790 kernel: audit: type=1130 audit(1734099335.059:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.052838 systemd[1]: Finished ignition-files.service. Dec 13 14:15:35.077484 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:15:35.079359 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:15:35.083042 systemd[1]: Starting ignition-quench.service... Dec 13 14:15:35.094715 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:15:35.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.094932 systemd[1]: Finished ignition-quench.service. Dec 13 14:15:35.107481 kernel: audit: type=1130 audit(1734099335.096:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.110535 initrd-setup-root-after-ignition[1363]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:15:35.115206 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:15:35.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.117557 systemd[1]: Reached target ignition-complete.target. Dec 13 14:15:35.122058 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:15:35.154604 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:15:35.156515 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:15:35.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.159913 systemd[1]: Reached target initrd-fs.target. Dec 13 14:15:35.162670 systemd[1]: Reached target initrd.target. Dec 13 14:15:35.165403 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:15:35.169476 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:15:35.195675 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:15:35.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.200523 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:15:35.222234 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:15:35.225695 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:15:35.229440 systemd[1]: Stopped target timers.target. Dec 13 14:15:35.232614 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:15:35.233410 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:15:35.237693 systemd[1]: Stopped target initrd.target. Dec 13 14:15:35.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.240480 systemd[1]: Stopped target basic.target. Dec 13 14:15:35.243586 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:15:35.246992 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:15:35.250357 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:15:35.253745 systemd[1]: Stopped target remote-fs.target. Dec 13 14:15:35.256784 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:15:35.259988 systemd[1]: Stopped target sysinit.target. Dec 13 14:15:35.262950 systemd[1]: Stopped target local-fs.target. Dec 13 14:15:35.265938 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:15:35.269191 systemd[1]: Stopped target swap.target. Dec 13 14:15:35.271945 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:15:35.274015 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:15:35.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.277270 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:15:35.280367 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:15:35.282394 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:15:35.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.285582 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:15:35.288034 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:15:35.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.291791 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:15:35.293779 systemd[1]: Stopped ignition-files.service. Dec 13 14:15:35.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.298482 systemd[1]: Stopping ignition-mount.service... Dec 13 14:15:35.314160 ignition[1376]: INFO : Ignition 2.14.0 Dec 13 14:15:35.314160 ignition[1376]: INFO : Stage: umount Dec 13 14:15:35.319791 systemd[1]: Stopping iscsiuio.service... Dec 13 14:15:35.327461 ignition[1376]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:15:35.327461 ignition[1376]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:15:35.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.321343 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:15:35.345484 ignition[1376]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:15:35.345484 ignition[1376]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:15:35.345484 ignition[1376]: INFO : PUT result: OK Dec 13 14:15:35.321742 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:15:35.354414 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:15:35.358455 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:15:35.361061 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:15:35.363282 ignition[1376]: INFO : umount: umount passed Dec 13 14:15:35.363282 ignition[1376]: INFO : Ignition finished successfully Dec 13 14:15:35.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.369969 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:15:35.372416 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:15:35.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.380964 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:15:35.383616 systemd[1]: Stopped iscsiuio.service. Dec 13 14:15:35.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.388157 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:15:35.390394 systemd[1]: Stopped ignition-mount.service. Dec 13 14:15:35.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.397565 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:15:35.402425 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:15:35.404483 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:15:35.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.408949 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:15:35.409090 systemd[1]: Stopped ignition-disks.service. Dec 13 14:15:35.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.413613 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:15:35.413724 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:15:35.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.419445 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:15:35.419557 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:15:35.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.425695 systemd[1]: Stopped target network.target. Dec 13 14:15:35.428402 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:15:35.428551 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:15:35.432000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.433563 systemd[1]: Stopped target paths.target. Dec 13 14:15:35.436279 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:15:35.441482 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:15:35.444663 systemd[1]: Stopped target slices.target. Dec 13 14:15:35.447764 systemd[1]: Stopped target sockets.target. Dec 13 14:15:35.450936 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:15:35.452730 systemd[1]: Closed iscsid.socket. Dec 13 14:15:35.455244 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:15:35.455348 systemd[1]: Closed iscsiuio.socket. Dec 13 14:15:35.459329 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:15:35.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.459460 systemd[1]: Stopped ignition-setup.service. Dec 13 14:15:35.462881 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:15:35.467652 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:15:35.472190 systemd-networkd[1183]: eth0: DHCPv6 lease lost Dec 13 14:15:35.477012 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:15:35.478613 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:15:35.479000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:15:35.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.482205 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:15:35.482442 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:15:35.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.487020 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:15:35.488000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:15:35.487128 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:15:35.492072 systemd[1]: Stopping network-cleanup.service... Dec 13 14:15:35.502120 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:15:35.502278 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:15:35.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.510797 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:15:35.510933 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:15:35.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.516745 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:15:35.516852 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:15:35.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.523380 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:15:35.535730 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:15:35.544374 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:15:35.546316 systemd[1]: Stopped network-cleanup.service. Dec 13 14:15:35.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.556078 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:15:35.556516 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:15:35.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.562822 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:15:35.563154 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:15:35.567622 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:15:35.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.567719 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:15:35.569889 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:15:35.569973 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:15:35.571692 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:15:35.588000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.572022 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:15:35.573485 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:15:35.573586 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:15:35.578277 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:15:35.578380 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:15:35.580037 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:15:35.580148 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:15:35.584588 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:15:35.588345 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:15:35.588519 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:15:35.623002 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:15:35.623670 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:15:35.627710 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:15:35.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:35.630161 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:15:35.649319 systemd[1]: Switching root. Dec 13 14:15:35.677609 iscsid[1188]: iscsid shutting down. Dec 13 14:15:35.679340 systemd-journald[309]: Received SIGTERM from PID 1 (systemd). Dec 13 14:15:35.679425 systemd-journald[309]: Journal stopped Dec 13 14:15:42.195974 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:15:42.196086 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:15:42.196141 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:15:42.196175 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:15:42.196206 kernel: SELinux: policy capability open_perms=1 Dec 13 14:15:42.196237 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:15:42.196267 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:15:42.196305 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:15:42.196341 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:15:42.196373 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:15:42.196403 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:15:42.196435 systemd[1]: Successfully loaded SELinux policy in 126.492ms. Dec 13 14:15:42.196495 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 29.807ms. Dec 13 14:15:42.196532 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:15:42.201727 systemd[1]: Detected virtualization amazon. Dec 13 14:15:42.204945 systemd[1]: Detected architecture arm64. Dec 13 14:15:42.204995 systemd[1]: Detected first boot. Dec 13 14:15:42.205030 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:15:42.205067 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:15:42.205149 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:15:42.205207 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:15:42.205245 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:15:42.205280 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:15:42.205314 kernel: kauditd_printk_skb: 55 callbacks suppressed Dec 13 14:15:42.205350 kernel: audit: type=1334 audit(1734099341.768:87): prog-id=12 op=LOAD Dec 13 14:15:42.205383 kernel: audit: type=1334 audit(1734099341.768:88): prog-id=3 op=UNLOAD Dec 13 14:15:42.205413 kernel: audit: type=1334 audit(1734099341.770:89): prog-id=13 op=LOAD Dec 13 14:15:42.205442 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:15:42.205470 kernel: audit: type=1334 audit(1734099341.772:90): prog-id=14 op=LOAD Dec 13 14:15:42.205499 systemd[1]: Stopped iscsid.service. Dec 13 14:15:42.205530 kernel: audit: type=1334 audit(1734099341.772:91): prog-id=4 op=UNLOAD Dec 13 14:15:42.205562 kernel: audit: type=1334 audit(1734099341.772:92): prog-id=5 op=UNLOAD Dec 13 14:15:42.205594 kernel: audit: type=1131 audit(1734099341.776:93): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.205622 kernel: audit: type=1334 audit(1734099341.783:94): prog-id=12 op=UNLOAD Dec 13 14:15:42.205653 kernel: audit: type=1131 audit(1734099341.798:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.205683 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:15:42.205716 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:15:42.205755 kernel: audit: type=1130 audit(1734099341.811:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.205786 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:15:42.205821 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:15:42.205852 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:15:42.205886 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 14:15:42.205915 systemd[1]: Created slice system-getty.slice. Dec 13 14:15:42.205945 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:15:42.205977 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:15:42.206007 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:15:42.206042 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:15:42.206074 systemd[1]: Created slice user.slice. Dec 13 14:15:42.206135 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:15:42.206168 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:15:42.206201 systemd[1]: Set up automount boot.automount. Dec 13 14:15:42.206231 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:15:42.206261 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:15:42.206292 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:15:42.206326 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:15:42.206361 systemd[1]: Reached target integritysetup.target. Dec 13 14:15:42.206393 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:15:42.206425 systemd[1]: Reached target remote-fs.target. Dec 13 14:15:42.206457 systemd[1]: Reached target slices.target. Dec 13 14:15:42.206488 systemd[1]: Reached target swap.target. Dec 13 14:15:42.206518 systemd[1]: Reached target torcx.target. Dec 13 14:15:42.206552 systemd[1]: Reached target veritysetup.target. Dec 13 14:15:42.206583 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:15:42.206615 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:15:42.206646 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:15:42.206679 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:15:42.206710 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:15:42.206754 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:15:42.206788 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:15:42.206821 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:15:42.206851 systemd[1]: Mounting media.mount... Dec 13 14:15:42.206897 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:15:42.206933 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:15:42.206964 systemd[1]: Mounting tmp.mount... Dec 13 14:15:42.206997 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:15:42.207049 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:15:42.207082 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:15:42.210840 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:15:42.210885 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:15:42.210916 systemd[1]: Starting modprobe@drm.service... Dec 13 14:15:42.210958 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:15:42.210991 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:15:42.211022 systemd[1]: Starting modprobe@loop.service... Dec 13 14:15:42.211135 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:15:42.211171 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:15:42.211202 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:15:42.211232 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:15:42.211262 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:15:42.211296 systemd[1]: Stopped systemd-journald.service. Dec 13 14:15:42.211326 kernel: loop: module loaded Dec 13 14:15:42.211358 systemd[1]: Starting systemd-journald.service... Dec 13 14:15:42.211389 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:15:42.211419 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:15:42.211454 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:15:42.211484 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:15:42.211513 kernel: fuse: init (API version 7.34) Dec 13 14:15:42.211545 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:15:42.211577 systemd[1]: Stopped verity-setup.service. Dec 13 14:15:42.211607 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:15:42.211646 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:15:42.211676 systemd[1]: Mounted media.mount. Dec 13 14:15:42.211706 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:15:42.211742 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:15:42.211775 systemd[1]: Mounted tmp.mount. Dec 13 14:15:42.211804 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:15:42.211853 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:15:42.211886 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:15:42.211917 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:15:42.211953 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:15:42.211983 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:15:42.212015 systemd[1]: Finished modprobe@drm.service. Dec 13 14:15:42.212047 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:15:42.212077 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:15:42.212145 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:15:42.212181 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:15:42.212213 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:15:42.212250 systemd[1]: Finished modprobe@loop.service. Dec 13 14:15:42.212283 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:15:42.212313 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:15:42.212347 systemd[1]: Reached target network-pre.target. Dec 13 14:15:42.212380 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:15:42.212414 systemd-journald[1484]: Journal started Dec 13 14:15:42.212513 systemd-journald[1484]: Runtime Journal (/run/log/journal/ec25a62c0fd2d93be3163011b0947228) is 8.0M, max 75.4M, 67.4M free. Dec 13 14:15:36.647000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:15:36.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:15:36.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:15:36.849000 audit: BPF prog-id=10 op=LOAD Dec 13 14:15:36.849000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:15:36.849000 audit: BPF prog-id=11 op=LOAD Dec 13 14:15:36.849000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:15:37.091000 audit[1410]: AVC avc: denied { associate } for pid=1410 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:15:37.091000 audit[1410]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458ac a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1393 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.091000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:15:37.095000 audit[1410]: AVC avc: denied { associate } for pid=1410 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:15:37.095000 audit[1410]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145985 a2=1ed a3=0 items=2 ppid=1393 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.095000 audit: CWD cwd="/" Dec 13 14:15:37.095000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:15:37.095000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:15:37.095000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:15:41.768000 audit: BPF prog-id=12 op=LOAD Dec 13 14:15:41.768000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:15:41.770000 audit: BPF prog-id=13 op=LOAD Dec 13 14:15:41.772000 audit: BPF prog-id=14 op=LOAD Dec 13 14:15:41.772000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:15:41.772000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:15:41.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:41.783000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:15:41.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:41.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:41.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.063000 audit: BPF prog-id=15 op=LOAD Dec 13 14:15:42.063000 audit: BPF prog-id=16 op=LOAD Dec 13 14:15:42.063000 audit: BPF prog-id=17 op=LOAD Dec 13 14:15:42.063000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:15:42.063000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:15:42.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.187000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:15:42.187000 audit[1484]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffe32884b0 a2=4000 a3=1 items=0 ppid=1 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:42.187000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:15:42.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:41.765657 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:15:42.231708 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:15:42.231764 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:15:37.086967 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:15:41.777042 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:15:37.088091 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:37Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:15:37.088176 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:37Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:15:37.088249 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:37Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:15:37.088275 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:37Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:15:37.088346 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:37Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:15:37.088378 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:37Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:15:37.088803 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:37Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:15:37.088892 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:37Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:15:37.088928 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:37Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:15:37.091449 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:37Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:15:37.091535 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:37Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:15:37.091584 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:37Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:15:37.091625 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:37Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:15:37.091674 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:37Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:15:37.091713 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:37Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:15:40.780171 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:40Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:15:42.244705 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:15:42.244779 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:15:40.780694 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:40Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:15:40.780938 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:40Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:15:40.781412 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:40Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:15:40.781522 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:40Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:15:40.781659 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:15:40Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:15:42.255134 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:15:42.255232 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:15:42.264845 systemd[1]: Started systemd-journald.service. Dec 13 14:15:42.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.267022 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:15:42.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.269134 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:15:42.271237 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:15:42.275798 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:15:42.280356 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:15:42.287396 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:15:42.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.289422 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:15:42.320746 systemd-journald[1484]: Time spent on flushing to /var/log/journal/ec25a62c0fd2d93be3163011b0947228 is 47.444ms for 1130 entries. Dec 13 14:15:42.320746 systemd-journald[1484]: System Journal (/var/log/journal/ec25a62c0fd2d93be3163011b0947228) is 8.0M, max 195.6M, 187.6M free. Dec 13 14:15:42.380230 systemd-journald[1484]: Received client request to flush runtime journal. Dec 13 14:15:42.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.358637 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:15:42.381888 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:15:42.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.388384 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:15:42.392377 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:15:42.438827 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:15:42.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:42.442773 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:15:42.458809 udevadm[1528]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 14:15:42.695355 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:15:42.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:43.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:43.173000 audit: BPF prog-id=18 op=LOAD Dec 13 14:15:43.173000 audit: BPF prog-id=19 op=LOAD Dec 13 14:15:43.173000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:15:43.173000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:15:43.171863 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:15:43.176042 systemd[1]: Starting systemd-udevd.service... Dec 13 14:15:43.214308 systemd-udevd[1529]: Using default interface naming scheme 'v252'. Dec 13 14:15:43.274879 systemd[1]: Started systemd-udevd.service. Dec 13 14:15:43.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:43.277000 audit: BPF prog-id=20 op=LOAD Dec 13 14:15:43.279636 systemd[1]: Starting systemd-networkd.service... Dec 13 14:15:43.297000 audit: BPF prog-id=21 op=LOAD Dec 13 14:15:43.297000 audit: BPF prog-id=22 op=LOAD Dec 13 14:15:43.297000 audit: BPF prog-id=23 op=LOAD Dec 13 14:15:43.300163 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:15:43.385266 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:15:43.405329 systemd[1]: Started systemd-userdbd.service. Dec 13 14:15:43.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:43.420228 (udev-worker)[1546]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:15:43.613633 systemd-networkd[1534]: lo: Link UP Dec 13 14:15:43.614144 systemd-networkd[1534]: lo: Gained carrier Dec 13 14:15:43.615258 systemd-networkd[1534]: Enumeration completed Dec 13 14:15:43.615623 systemd[1]: Started systemd-networkd.service. Dec 13 14:15:43.617276 systemd-networkd[1534]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:15:43.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:43.619602 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:15:43.625140 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:15:43.625621 systemd-networkd[1534]: eth0: Link UP Dec 13 14:15:43.626115 systemd-networkd[1534]: eth0: Gained carrier Dec 13 14:15:43.639388 systemd-networkd[1534]: eth0: DHCPv4 address 172.31.31.121/20, gateway 172.31.16.1 acquired from 172.31.16.1 Dec 13 14:15:43.653149 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1545) Dec 13 14:15:43.758910 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:15:43.761536 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:15:43.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:43.765616 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:15:43.850127 lvm[1644]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:15:43.887720 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:15:43.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:43.889896 systemd[1]: Reached target cryptsetup.target. Dec 13 14:15:43.893672 systemd[1]: Starting lvm2-activation.service... Dec 13 14:15:43.902328 lvm[1645]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:15:43.938923 systemd[1]: Finished lvm2-activation.service. Dec 13 14:15:43.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:43.940892 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:15:43.942746 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:15:43.942945 systemd[1]: Reached target local-fs.target. Dec 13 14:15:43.944635 systemd[1]: Reached target machines.target. Dec 13 14:15:43.960115 systemd[1]: Starting ldconfig.service... Dec 13 14:15:43.963176 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:15:43.963474 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:43.965985 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:15:43.969990 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:15:43.974483 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:15:43.978650 systemd[1]: Starting systemd-sysext.service... Dec 13 14:15:43.995915 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1647 (bootctl) Dec 13 14:15:43.998740 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:15:44.026550 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:15:44.041475 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:15:44.041864 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:15:44.074154 kernel: loop0: detected capacity change from 0 to 189592 Dec 13 14:15:44.080510 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:15:44.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:44.164994 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:15:44.166595 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:15:44.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:44.179219 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:15:44.188834 systemd-fsck[1657]: fsck.fat 4.2 (2021-01-31) Dec 13 14:15:44.188834 systemd-fsck[1657]: /dev/nvme0n1p1: 236 files, 117175/258078 clusters Dec 13 14:15:44.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:44.189189 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:15:44.193746 systemd[1]: Mounting boot.mount... Dec 13 14:15:44.206154 kernel: loop1: detected capacity change from 0 to 189592 Dec 13 14:15:44.224624 systemd[1]: Mounted boot.mount. Dec 13 14:15:44.228526 (sd-sysext)[1661]: Using extensions 'kubernetes'. Dec 13 14:15:44.229367 (sd-sysext)[1661]: Merged extensions into '/usr'. Dec 13 14:15:44.271219 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:15:44.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:44.281992 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:15:44.285632 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:15:44.288347 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:15:44.292875 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:15:44.298943 systemd[1]: Starting modprobe@loop.service... Dec 13 14:15:44.300578 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:15:44.300903 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:44.307814 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:15:44.310277 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:15:44.310588 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:15:44.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:44.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:44.312957 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:15:44.313305 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:15:44.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:44.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:44.315871 systemd[1]: Finished systemd-sysext.service. Dec 13 14:15:44.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:44.318089 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:15:44.318450 systemd[1]: Finished modprobe@loop.service. Dec 13 14:15:44.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:44.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:44.324541 systemd[1]: Starting ensure-sysext.service... Dec 13 14:15:44.326005 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:15:44.326341 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:15:44.328616 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:15:44.341566 systemd[1]: Reloading. Dec 13 14:15:44.420229 systemd-tmpfiles[1679]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:15:44.455728 /usr/lib/systemd/system-generators/torcx-generator[1699]: time="2024-12-13T14:15:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:15:44.457004 /usr/lib/systemd/system-generators/torcx-generator[1699]: time="2024-12-13T14:15:44Z" level=info msg="torcx already run" Dec 13 14:15:44.458846 systemd-tmpfiles[1679]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:15:44.516808 systemd-tmpfiles[1679]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:15:44.662805 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:15:44.662843 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:15:44.709542 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:15:44.871000 audit: BPF prog-id=24 op=LOAD Dec 13 14:15:44.871000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:15:44.872000 audit: BPF prog-id=25 op=LOAD Dec 13 14:15:44.872000 audit: BPF prog-id=26 op=LOAD Dec 13 14:15:44.873000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:15:44.873000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:15:44.875000 audit: BPF prog-id=27 op=LOAD Dec 13 14:15:44.875000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:15:44.877000 audit: BPF prog-id=28 op=LOAD Dec 13 14:15:44.877000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:15:44.877000 audit: BPF prog-id=29 op=LOAD Dec 13 14:15:44.877000 audit: BPF prog-id=30 op=LOAD Dec 13 14:15:44.878000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:15:44.878000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:15:44.882000 audit: BPF prog-id=31 op=LOAD Dec 13 14:15:44.882000 audit: BPF prog-id=32 op=LOAD Dec 13 14:15:44.882000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:15:44.882000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:15:44.895243 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:15:44.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:44.906424 systemd[1]: Starting audit-rules.service... Dec 13 14:15:44.913248 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:15:44.917854 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:15:44.920000 audit: BPF prog-id=33 op=LOAD Dec 13 14:15:44.923527 systemd[1]: Starting systemd-resolved.service... Dec 13 14:15:44.925000 audit: BPF prog-id=34 op=LOAD Dec 13 14:15:44.929255 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:15:44.933710 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:15:44.949724 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:15:44.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:44.952409 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:15:44.955693 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:15:44.959624 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:15:44.962354 systemd-networkd[1534]: eth0: Gained IPv6LL Dec 13 14:15:44.964986 systemd[1]: Starting modprobe@loop.service... Dec 13 14:15:44.967056 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:15:44.967484 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:44.967749 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:15:44.970660 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:15:44.971736 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:15:44.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:44.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:44.974519 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:15:44.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:44.980316 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:15:44.986510 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:15:44.988163 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:15:44.988480 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:44.988789 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:15:44.990897 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:15:44.991321 systemd[1]: Finished modprobe@loop.service. Dec 13 14:15:44.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:44.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:45.002908 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:15:45.003288 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:15:45.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:45.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:45.006232 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:15:45.009313 systemd[1]: Starting modprobe@drm.service... Dec 13 14:15:45.013357 systemd[1]: Starting modprobe@loop.service... Dec 13 14:15:45.015054 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:15:45.015406 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:45.015668 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:15:45.015955 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:15:45.020876 systemd[1]: Finished ensure-sysext.service. Dec 13 14:15:45.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:45.028640 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:15:45.028938 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:15:45.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:45.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:45.040000 audit[1761]: SYSTEM_BOOT pid=1761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:15:45.048626 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:15:45.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:45.052756 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:15:45.053070 systemd[1]: Finished modprobe@loop.service. Dec 13 14:15:45.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:45.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:45.055365 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:15:45.056469 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:15:45.056765 systemd[1]: Finished modprobe@drm.service. Dec 13 14:15:45.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:45.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:45.074755 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:15:45.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:45.155881 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:15:45.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:45.157800 systemd[1]: Reached target time-set.target. Dec 13 14:15:45.161000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:15:45.161000 audit[1781]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd5a8ae00 a2=420 a3=0 items=0 ppid=1755 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:45.161000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:15:45.162864 augenrules[1781]: No rules Dec 13 14:15:45.164730 systemd[1]: Finished audit-rules.service. Dec 13 14:15:45.181297 systemd-resolved[1759]: Positive Trust Anchors: Dec 13 14:15:45.181794 systemd-resolved[1759]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:15:45.181948 systemd-resolved[1759]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:15:45.236467 systemd-timesyncd[1760]: Contacted time server 74.208.25.46:123 (0.flatcar.pool.ntp.org). Dec 13 14:15:45.236710 systemd-timesyncd[1760]: Initial clock synchronization to Fri 2024-12-13 14:15:45.183128 UTC. Dec 13 14:15:45.245859 systemd-resolved[1759]: Defaulting to hostname 'linux'. Dec 13 14:15:45.250412 systemd[1]: Started systemd-resolved.service. Dec 13 14:15:45.252227 systemd[1]: Reached target network.target. Dec 13 14:15:45.253905 systemd[1]: Reached target network-online.target. Dec 13 14:15:45.255684 systemd[1]: Reached target nss-lookup.target. Dec 13 14:15:45.760020 ldconfig[1646]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:15:45.771257 systemd[1]: Finished ldconfig.service. Dec 13 14:15:45.775407 systemd[1]: Starting systemd-update-done.service... Dec 13 14:15:45.791360 systemd[1]: Finished systemd-update-done.service. Dec 13 14:15:45.793437 systemd[1]: Reached target sysinit.target. Dec 13 14:15:45.795391 systemd[1]: Started motdgen.path. Dec 13 14:15:45.796850 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:15:45.799317 systemd[1]: Started logrotate.timer. Dec 13 14:15:45.801057 systemd[1]: Started mdadm.timer. Dec 13 14:15:45.802475 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:15:45.804186 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:15:45.804253 systemd[1]: Reached target paths.target. Dec 13 14:15:45.805697 systemd[1]: Reached target timers.target. Dec 13 14:15:45.807934 systemd[1]: Listening on dbus.socket. Dec 13 14:15:45.811463 systemd[1]: Starting docker.socket... Dec 13 14:15:45.818596 systemd[1]: Listening on sshd.socket. Dec 13 14:15:45.820317 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:45.821210 systemd[1]: Listening on docker.socket. Dec 13 14:15:45.822866 systemd[1]: Reached target sockets.target. Dec 13 14:15:45.824385 systemd[1]: Reached target basic.target. Dec 13 14:15:45.825889 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:15:45.825959 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:15:45.828200 systemd[1]: Started amazon-ssm-agent.service. Dec 13 14:15:45.832369 systemd[1]: Starting containerd.service... Dec 13 14:15:45.839286 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 14:15:45.843468 systemd[1]: Starting dbus.service... Dec 13 14:15:45.854299 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:15:45.865810 systemd[1]: Starting extend-filesystems.service... Dec 13 14:15:45.872581 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:15:45.876728 systemd[1]: Starting kubelet.service... Dec 13 14:15:45.885769 systemd[1]: Starting motdgen.service... Dec 13 14:15:45.890456 systemd[1]: Started nvidia.service. Dec 13 14:15:45.897465 systemd[1]: Starting prepare-helm.service... Dec 13 14:15:45.901412 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:15:45.907668 systemd[1]: Starting sshd-keygen.service... Dec 13 14:15:45.937546 systemd[1]: Starting systemd-logind.service... Dec 13 14:15:45.939138 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:15:45.939290 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:15:45.969579 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:15:45.971126 systemd[1]: Starting update-engine.service... Dec 13 14:15:45.974853 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:15:46.060047 jq[1805]: true Dec 13 14:15:46.060509 jq[1794]: false Dec 13 14:15:46.068857 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:15:46.069254 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:15:46.077125 tar[1808]: linux-arm64/helm Dec 13 14:15:46.091056 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:15:46.091527 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:15:46.132610 jq[1824]: true Dec 13 14:15:46.178720 dbus-daemon[1793]: [system] SELinux support is enabled Dec 13 14:15:46.179503 systemd[1]: Started dbus.service. Dec 13 14:15:46.184504 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:15:46.184560 systemd[1]: Reached target system-config.target. Dec 13 14:15:46.186367 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:15:46.186415 systemd[1]: Reached target user-config.target. Dec 13 14:15:46.205108 amazon-ssm-agent[1790]: 2024/12/13 14:15:46 Failed to load instance info from vault. RegistrationKey does not exist. Dec 13 14:15:46.208973 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:15:46.209364 systemd[1]: Finished motdgen.service. Dec 13 14:15:46.212365 dbus-daemon[1793]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1534 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 14:15:46.219363 systemd[1]: Starting systemd-hostnamed.service... Dec 13 14:15:46.231631 amazon-ssm-agent[1790]: Initializing new seelog logger Dec 13 14:15:46.231885 amazon-ssm-agent[1790]: New Seelog Logger Creation Complete Dec 13 14:15:46.231991 amazon-ssm-agent[1790]: 2024/12/13 14:15:46 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Dec 13 14:15:46.231991 amazon-ssm-agent[1790]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Dec 13 14:15:46.232374 amazon-ssm-agent[1790]: 2024/12/13 14:15:46 processing appconfig overrides Dec 13 14:15:46.257473 extend-filesystems[1795]: Found loop1 Dec 13 14:15:46.257473 extend-filesystems[1795]: Found nvme0n1 Dec 13 14:15:46.257473 extend-filesystems[1795]: Found nvme0n1p1 Dec 13 14:15:46.257473 extend-filesystems[1795]: Found nvme0n1p2 Dec 13 14:15:46.257473 extend-filesystems[1795]: Found nvme0n1p3 Dec 13 14:15:46.257473 extend-filesystems[1795]: Found usr Dec 13 14:15:46.257473 extend-filesystems[1795]: Found nvme0n1p4 Dec 13 14:15:46.257473 extend-filesystems[1795]: Found nvme0n1p6 Dec 13 14:15:46.257473 extend-filesystems[1795]: Found nvme0n1p7 Dec 13 14:15:46.257473 extend-filesystems[1795]: Found nvme0n1p9 Dec 13 14:15:46.257473 extend-filesystems[1795]: Checking size of /dev/nvme0n1p9 Dec 13 14:15:46.306368 update_engine[1804]: I1213 14:15:46.304320 1804 main.cc:92] Flatcar Update Engine starting Dec 13 14:15:46.312985 systemd[1]: Started update-engine.service. Dec 13 14:15:46.317620 systemd[1]: Started locksmithd.service. Dec 13 14:15:46.320124 update_engine[1804]: I1213 14:15:46.320005 1804 update_check_scheduler.cc:74] Next update check in 9m58s Dec 13 14:15:46.335511 extend-filesystems[1795]: Resized partition /dev/nvme0n1p9 Dec 13 14:15:46.339455 bash[1858]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:15:46.341222 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:15:46.353060 extend-filesystems[1867]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:15:46.374196 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Dec 13 14:15:46.390737 env[1814]: time="2024-12-13T14:15:46.390644930Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:15:46.455124 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Dec 13 14:15:46.469613 extend-filesystems[1867]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Dec 13 14:15:46.469613 extend-filesystems[1867]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 14:15:46.469613 extend-filesystems[1867]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Dec 13 14:15:46.483933 extend-filesystems[1795]: Resized filesystem in /dev/nvme0n1p9 Dec 13 14:15:46.471570 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:15:46.472081 systemd[1]: Finished extend-filesystems.service. Dec 13 14:15:46.534290 systemd[1]: nvidia.service: Deactivated successfully. Dec 13 14:15:46.594571 systemd-logind[1803]: Watching system buttons on /dev/input/event0 (Power Button) Dec 13 14:15:46.599242 systemd-logind[1803]: Watching system buttons on /dev/input/event1 (Sleep Button) Dec 13 14:15:46.603694 env[1814]: time="2024-12-13T14:15:46.603619366Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:15:46.604269 env[1814]: time="2024-12-13T14:15:46.604204829Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:15:46.607617 systemd-logind[1803]: New seat seat0. Dec 13 14:15:46.613450 systemd[1]: Started systemd-logind.service. Dec 13 14:15:46.619979 env[1814]: time="2024-12-13T14:15:46.619880774Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:15:46.620316 env[1814]: time="2024-12-13T14:15:46.620232791Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:15:46.621857 env[1814]: time="2024-12-13T14:15:46.621779789Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:15:46.623413 env[1814]: time="2024-12-13T14:15:46.623331329Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:15:46.623704 env[1814]: time="2024-12-13T14:15:46.623636881Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:15:46.623885 env[1814]: time="2024-12-13T14:15:46.623850063Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:15:46.624385 env[1814]: time="2024-12-13T14:15:46.624314381Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:15:46.628122 env[1814]: time="2024-12-13T14:15:46.628030461Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:15:46.630228 env[1814]: time="2024-12-13T14:15:46.630143647Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:15:46.630453 env[1814]: time="2024-12-13T14:15:46.630418397Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:15:46.630797 env[1814]: time="2024-12-13T14:15:46.630755180Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:15:46.631044 env[1814]: time="2024-12-13T14:15:46.631006853Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:15:46.641262 env[1814]: time="2024-12-13T14:15:46.640082529Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:15:46.641262 env[1814]: time="2024-12-13T14:15:46.640227801Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:15:46.641262 env[1814]: time="2024-12-13T14:15:46.640263800Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:15:46.641262 env[1814]: time="2024-12-13T14:15:46.640358161Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:15:46.641262 env[1814]: time="2024-12-13T14:15:46.640419181Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:15:46.641262 env[1814]: time="2024-12-13T14:15:46.640454035Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:15:46.641262 env[1814]: time="2024-12-13T14:15:46.640512218Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:15:46.642071 env[1814]: time="2024-12-13T14:15:46.641217289Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:15:46.642071 env[1814]: time="2024-12-13T14:15:46.641770115Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:15:46.642071 env[1814]: time="2024-12-13T14:15:46.641835939Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:15:46.642071 env[1814]: time="2024-12-13T14:15:46.641869756Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:15:46.642071 env[1814]: time="2024-12-13T14:15:46.641925293Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:15:46.642653 env[1814]: time="2024-12-13T14:15:46.642583100Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:15:46.643040 env[1814]: time="2024-12-13T14:15:46.642981177Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:15:46.643756 env[1814]: time="2024-12-13T14:15:46.643692065Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:15:46.643959 env[1814]: time="2024-12-13T14:15:46.643928217Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:15:46.644126 env[1814]: time="2024-12-13T14:15:46.644060675Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:15:46.644354 env[1814]: time="2024-12-13T14:15:46.644320239Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:15:46.644517 env[1814]: time="2024-12-13T14:15:46.644485239Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:15:46.644650 env[1814]: time="2024-12-13T14:15:46.644619676Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:15:46.644770 env[1814]: time="2024-12-13T14:15:46.644740988Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:15:46.644893 env[1814]: time="2024-12-13T14:15:46.644863528Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:15:46.645042 env[1814]: time="2024-12-13T14:15:46.645014582Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:15:46.645203 env[1814]: time="2024-12-13T14:15:46.645173038Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:15:46.645454 env[1814]: time="2024-12-13T14:15:46.645422552Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:15:46.645612 env[1814]: time="2024-12-13T14:15:46.645580150Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:15:46.645996 env[1814]: time="2024-12-13T14:15:46.645965258Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:15:46.646177 env[1814]: time="2024-12-13T14:15:46.646148269Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:15:46.646339 env[1814]: time="2024-12-13T14:15:46.646288213Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:15:46.647199 env[1814]: time="2024-12-13T14:15:46.647164984Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:15:46.647352 env[1814]: time="2024-12-13T14:15:46.647313212Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:15:46.647481 env[1814]: time="2024-12-13T14:15:46.647436932Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:15:46.648293 env[1814]: time="2024-12-13T14:15:46.648251395Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:15:46.648489 env[1814]: time="2024-12-13T14:15:46.648459082Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:15:46.649042 env[1814]: time="2024-12-13T14:15:46.648942198Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:15:46.650581 env[1814]: time="2024-12-13T14:15:46.650193002Z" level=info msg="Connect containerd service" Dec 13 14:15:46.650581 env[1814]: time="2024-12-13T14:15:46.650303682Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:15:46.654183 env[1814]: time="2024-12-13T14:15:46.654068289Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:15:46.654874 env[1814]: time="2024-12-13T14:15:46.654830506Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:15:46.656391 env[1814]: time="2024-12-13T14:15:46.656280628Z" level=info msg="Start subscribing containerd event" Dec 13 14:15:46.656636 env[1814]: time="2024-12-13T14:15:46.656414779Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:15:46.657439 env[1814]: time="2024-12-13T14:15:46.656769275Z" level=info msg="containerd successfully booted in 0.275163s" Dec 13 14:15:46.656920 systemd[1]: Started containerd.service. Dec 13 14:15:46.659438 env[1814]: time="2024-12-13T14:15:46.656597862Z" level=info msg="Start recovering state" Dec 13 14:15:46.659781 env[1814]: time="2024-12-13T14:15:46.659725296Z" level=info msg="Start event monitor" Dec 13 14:15:46.659940 env[1814]: time="2024-12-13T14:15:46.659911144Z" level=info msg="Start snapshots syncer" Dec 13 14:15:46.660151 env[1814]: time="2024-12-13T14:15:46.660080781Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:15:46.660289 env[1814]: time="2024-12-13T14:15:46.660261230Z" level=info msg="Start streaming server" Dec 13 14:15:46.746299 dbus-daemon[1793]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 14:15:46.746568 systemd[1]: Started systemd-hostnamed.service. Dec 13 14:15:46.749884 dbus-daemon[1793]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1844 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 14:15:46.754922 systemd[1]: Starting polkit.service... Dec 13 14:15:46.820514 polkitd[1883]: Started polkitd version 121 Dec 13 14:15:46.871945 polkitd[1883]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 14:15:46.873564 polkitd[1883]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 14:15:46.879434 polkitd[1883]: Finished loading, compiling and executing 2 rules Dec 13 14:15:46.880443 dbus-daemon[1793]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 14:15:46.880720 systemd[1]: Started polkit.service. Dec 13 14:15:46.883933 polkitd[1883]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 14:15:46.957217 systemd-resolved[1759]: System hostname changed to 'ip-172-31-31-121'. Dec 13 14:15:46.957226 systemd-hostnamed[1844]: Hostname set to (transient) Dec 13 14:15:47.029063 coreos-metadata[1792]: Dec 13 14:15:47.028 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Dec 13 14:15:47.034012 coreos-metadata[1792]: Dec 13 14:15:47.033 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Dec 13 14:15:47.035111 coreos-metadata[1792]: Dec 13 14:15:47.034 INFO Fetch successful Dec 13 14:15:47.035111 coreos-metadata[1792]: Dec 13 14:15:47.035 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 14:15:47.036108 coreos-metadata[1792]: Dec 13 14:15:47.036 INFO Fetch successful Dec 13 14:15:47.039386 unknown[1792]: wrote ssh authorized keys file for user: core Dec 13 14:15:47.093631 update-ssh-keys[1911]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:15:47.094846 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 14:15:47.283811 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO Create new startup processor Dec 13 14:15:47.286207 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [LongRunningPluginsManager] registered plugins: {} Dec 13 14:15:47.286436 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO Initializing bookkeeping folders Dec 13 14:15:47.286626 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO removing the completed state files Dec 13 14:15:47.286771 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO Initializing bookkeeping folders for long running plugins Dec 13 14:15:47.286916 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Dec 13 14:15:47.287056 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO Initializing healthcheck folders for long running plugins Dec 13 14:15:47.287238 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO Initializing locations for inventory plugin Dec 13 14:15:47.287499 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO Initializing default location for custom inventory Dec 13 14:15:47.287654 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO Initializing default location for file inventory Dec 13 14:15:47.295564 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO Initializing default location for role inventory Dec 13 14:15:47.296475 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO Init the cloudwatchlogs publisher Dec 13 14:15:47.313494 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [instanceID=i-05c3be9eb9c3cf08a] Successfully loaded platform independent plugin aws:softwareInventory Dec 13 14:15:47.313494 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [instanceID=i-05c3be9eb9c3cf08a] Successfully loaded platform independent plugin aws:configurePackage Dec 13 14:15:47.313494 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [instanceID=i-05c3be9eb9c3cf08a] Successfully loaded platform independent plugin aws:runDocument Dec 13 14:15:47.313494 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [instanceID=i-05c3be9eb9c3cf08a] Successfully loaded platform independent plugin aws:runPowerShellScript Dec 13 14:15:47.313494 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [instanceID=i-05c3be9eb9c3cf08a] Successfully loaded platform independent plugin aws:updateSsmAgent Dec 13 14:15:47.313494 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [instanceID=i-05c3be9eb9c3cf08a] Successfully loaded platform independent plugin aws:configureDocker Dec 13 14:15:47.313494 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [instanceID=i-05c3be9eb9c3cf08a] Successfully loaded platform independent plugin aws:runDockerAction Dec 13 14:15:47.313494 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [instanceID=i-05c3be9eb9c3cf08a] Successfully loaded platform independent plugin aws:refreshAssociation Dec 13 14:15:47.313494 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [instanceID=i-05c3be9eb9c3cf08a] Successfully loaded platform independent plugin aws:downloadContent Dec 13 14:15:47.313494 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [instanceID=i-05c3be9eb9c3cf08a] Successfully loaded platform dependent plugin aws:runShellScript Dec 13 14:15:47.313494 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Dec 13 14:15:47.313494 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO OS: linux, Arch: arm64 Dec 13 14:15:47.318127 amazon-ssm-agent[1790]: datastore file /var/lib/amazon/ssm/i-05c3be9eb9c3cf08a/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Dec 13 14:15:47.410122 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [MessagingDeliveryService] Starting document processing engine... Dec 13 14:15:47.505196 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [MessagingDeliveryService] [EngineProcessor] Starting Dec 13 14:15:47.599325 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Dec 13 14:15:47.694655 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [MessagingDeliveryService] Starting message polling Dec 13 14:15:47.789384 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [MessagingDeliveryService] Starting send replies to MDS Dec 13 14:15:47.806339 tar[1808]: linux-arm64/LICENSE Dec 13 14:15:47.807152 tar[1808]: linux-arm64/README.md Dec 13 14:15:47.818546 systemd[1]: Finished prepare-helm.service. Dec 13 14:15:47.884554 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [instanceID=i-05c3be9eb9c3cf08a] Starting association polling Dec 13 14:15:47.906912 locksmithd[1863]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:15:47.979587 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Dec 13 14:15:48.074930 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [MessagingDeliveryService] [Association] Launching response handler Dec 13 14:15:48.170541 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Dec 13 14:15:48.266199 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Dec 13 14:15:48.362115 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Dec 13 14:15:48.408157 systemd[1]: Started kubelet.service. Dec 13 14:15:48.458304 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [MessageGatewayService] Starting session document processing engine... Dec 13 14:15:48.554592 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [MessageGatewayService] [EngineProcessor] Starting Dec 13 14:15:48.651114 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Dec 13 14:15:48.747872 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-05c3be9eb9c3cf08a, requestId: 266d49f7-1d9c-499c-a0c9-ba2bb9330815 Dec 13 14:15:48.844706 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [OfflineService] Starting document processing engine... Dec 13 14:15:48.941790 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [OfflineService] [EngineProcessor] Starting Dec 13 14:15:49.039174 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [OfflineService] [EngineProcessor] Initial processing Dec 13 14:15:49.136540 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [MessageGatewayService] listening reply. Dec 13 14:15:49.234242 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [OfflineService] Starting message polling Dec 13 14:15:49.332165 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [OfflineService] Starting send replies to MDS Dec 13 14:15:49.403168 kubelet[1994]: E1213 14:15:49.403068 1994 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:15:49.406923 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:15:49.407263 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:15:49.407708 systemd[1]: kubelet.service: Consumed 1.424s CPU time. Dec 13 14:15:49.430225 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [LongRunningPluginsManager] starting long running plugin manager Dec 13 14:15:49.478769 sshd_keygen[1817]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:15:49.514998 systemd[1]: Finished sshd-keygen.service. Dec 13 14:15:49.519383 systemd[1]: Starting issuegen.service... Dec 13 14:15:49.528517 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Dec 13 14:15:49.530559 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:15:49.530917 systemd[1]: Finished issuegen.service. Dec 13 14:15:49.535573 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:15:49.550771 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:15:49.555817 systemd[1]: Started getty@tty1.service. Dec 13 14:15:49.560408 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:15:49.562502 systemd[1]: Reached target getty.target. Dec 13 14:15:49.564201 systemd[1]: Reached target multi-user.target. Dec 13 14:15:49.568484 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:15:49.584151 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:15:49.584531 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:15:49.586670 systemd[1]: Startup finished in 1.156s (kernel) + 8.882s (initrd) + 13.112s (userspace) = 23.151s. Dec 13 14:15:49.626977 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [HealthCheck] HealthCheck reporting agent health. Dec 13 14:15:49.725717 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [StartupProcessor] Executing startup processor tasks Dec 13 14:15:49.824628 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Dec 13 14:15:49.923732 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Dec 13 14:15:50.022971 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.6 Dec 13 14:15:50.122494 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Dec 13 14:15:50.222210 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-05c3be9eb9c3cf08a?role=subscribe&stream=input Dec 13 14:15:50.322055 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-05c3be9eb9c3cf08a?role=subscribe&stream=input Dec 13 14:15:50.422156 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [MessageGatewayService] Starting receiving message from control channel Dec 13 14:15:50.522539 amazon-ssm-agent[1790]: 2024-12-13 14:15:47 INFO [MessageGatewayService] [EngineProcessor] Initial processing Dec 13 14:15:53.997295 systemd[1]: Created slice system-sshd.slice. Dec 13 14:15:53.999726 systemd[1]: Started sshd@0-172.31.31.121:22-139.178.89.65:33088.service. Dec 13 14:15:54.193518 sshd[2015]: Accepted publickey for core from 139.178.89.65 port 33088 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:54.199657 sshd[2015]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:54.221554 systemd[1]: Created slice user-500.slice. Dec 13 14:15:54.224037 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:15:54.233223 systemd-logind[1803]: New session 1 of user core. Dec 13 14:15:54.245655 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:15:54.249035 systemd[1]: Starting user@500.service... Dec 13 14:15:54.259012 (systemd)[2018]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:54.457527 systemd[2018]: Queued start job for default target default.target. Dec 13 14:15:54.459825 systemd[2018]: Reached target paths.target. Dec 13 14:15:54.460066 systemd[2018]: Reached target sockets.target. Dec 13 14:15:54.460258 systemd[2018]: Reached target timers.target. Dec 13 14:15:54.460404 systemd[2018]: Reached target basic.target. Dec 13 14:15:54.460621 systemd[2018]: Reached target default.target. Dec 13 14:15:54.460716 systemd[1]: Started user@500.service. Dec 13 14:15:54.461400 systemd[2018]: Startup finished in 189ms. Dec 13 14:15:54.463599 systemd[1]: Started session-1.scope. Dec 13 14:15:54.615572 systemd[1]: Started sshd@1-172.31.31.121:22-139.178.89.65:33096.service. Dec 13 14:15:54.782615 sshd[2027]: Accepted publickey for core from 139.178.89.65 port 33096 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:54.785390 sshd[2027]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:54.795269 systemd[1]: Started session-2.scope. Dec 13 14:15:54.796286 systemd-logind[1803]: New session 2 of user core. Dec 13 14:15:54.925875 sshd[2027]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:54.931462 systemd-logind[1803]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:15:54.931837 systemd[1]: sshd@1-172.31.31.121:22-139.178.89.65:33096.service: Deactivated successfully. Dec 13 14:15:54.933078 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:15:54.934749 systemd-logind[1803]: Removed session 2. Dec 13 14:15:54.953514 systemd[1]: Started sshd@2-172.31.31.121:22-139.178.89.65:33098.service. Dec 13 14:15:55.120408 sshd[2033]: Accepted publickey for core from 139.178.89.65 port 33098 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:55.123613 sshd[2033]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:55.132316 systemd-logind[1803]: New session 3 of user core. Dec 13 14:15:55.132393 systemd[1]: Started session-3.scope. Dec 13 14:15:55.255002 sshd[2033]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:55.260409 systemd[1]: sshd@2-172.31.31.121:22-139.178.89.65:33098.service: Deactivated successfully. Dec 13 14:15:55.261634 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:15:55.262842 systemd-logind[1803]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:15:55.264819 systemd-logind[1803]: Removed session 3. Dec 13 14:15:55.283520 systemd[1]: Started sshd@3-172.31.31.121:22-139.178.89.65:33100.service. Dec 13 14:15:55.453908 sshd[2039]: Accepted publickey for core from 139.178.89.65 port 33100 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:55.456909 sshd[2039]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:55.465191 systemd[1]: Started session-4.scope. Dec 13 14:15:55.466451 systemd-logind[1803]: New session 4 of user core. Dec 13 14:15:55.598955 sshd[2039]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:55.603933 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:15:55.605080 systemd[1]: sshd@3-172.31.31.121:22-139.178.89.65:33100.service: Deactivated successfully. Dec 13 14:15:55.606732 systemd-logind[1803]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:15:55.609273 systemd-logind[1803]: Removed session 4. Dec 13 14:15:55.625554 systemd[1]: Started sshd@4-172.31.31.121:22-139.178.89.65:33114.service. Dec 13 14:15:55.790712 sshd[2045]: Accepted publickey for core from 139.178.89.65 port 33114 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:55.793738 sshd[2045]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:55.802236 systemd[1]: Started session-5.scope. Dec 13 14:15:55.803201 systemd-logind[1803]: New session 5 of user core. Dec 13 14:15:55.944279 sudo[2048]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:15:55.944847 sudo[2048]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:15:55.960376 dbus-daemon[1793]: avc: received setenforce notice (enforcing=1) Dec 13 14:15:55.963818 sudo[2048]: pam_unix(sudo:session): session closed for user root Dec 13 14:15:55.988034 sshd[2045]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:55.993753 systemd[1]: sshd@4-172.31.31.121:22-139.178.89.65:33114.service: Deactivated successfully. Dec 13 14:15:55.995070 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:15:55.996232 systemd-logind[1803]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:15:55.997754 systemd-logind[1803]: Removed session 5. Dec 13 14:15:56.017038 systemd[1]: Started sshd@5-172.31.31.121:22-139.178.89.65:33116.service. Dec 13 14:15:56.186815 sshd[2052]: Accepted publickey for core from 139.178.89.65 port 33116 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:56.189554 sshd[2052]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:56.197642 systemd-logind[1803]: New session 6 of user core. Dec 13 14:15:56.198533 systemd[1]: Started session-6.scope. Dec 13 14:15:56.307362 sudo[2056]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:15:56.307956 sudo[2056]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:15:56.313010 sudo[2056]: pam_unix(sudo:session): session closed for user root Dec 13 14:15:56.322618 sudo[2055]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:15:56.323212 sudo[2055]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:15:56.340711 systemd[1]: Stopping audit-rules.service... Dec 13 14:15:56.341000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:15:56.344634 kernel: kauditd_printk_skb: 106 callbacks suppressed Dec 13 14:15:56.344783 kernel: audit: type=1305 audit(1734099356.341:199): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:15:56.341000 audit[2059]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffda13cbd0 a2=420 a3=0 items=0 ppid=1 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:56.350203 auditctl[2059]: No rules Dec 13 14:15:56.351236 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:15:56.351618 systemd[1]: Stopped audit-rules.service. Dec 13 14:15:56.359864 kernel: audit: type=1300 audit(1734099356.341:199): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffda13cbd0 a2=420 a3=0 items=0 ppid=1 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:56.361989 systemd[1]: Starting audit-rules.service... Dec 13 14:15:56.341000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:15:56.367166 kernel: audit: type=1327 audit(1734099356.341:199): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:15:56.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:56.375994 kernel: audit: type=1131 audit(1734099356.348:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:56.396634 augenrules[2076]: No rules Dec 13 14:15:56.398353 systemd[1]: Finished audit-rules.service. Dec 13 14:15:56.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:56.400573 sudo[2055]: pam_unix(sudo:session): session closed for user root Dec 13 14:15:56.398000 audit[2055]: USER_END pid=2055 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:56.415796 kernel: audit: type=1130 audit(1734099356.397:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:56.415937 kernel: audit: type=1106 audit(1734099356.398:202): pid=2055 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:56.415992 kernel: audit: type=1104 audit(1734099356.398:203): pid=2055 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:56.398000 audit[2055]: CRED_DISP pid=2055 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:56.424255 sshd[2052]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:56.425000 audit[2052]: USER_END pid=2052 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:56.430062 systemd[1]: sshd@5-172.31.31.121:22-139.178.89.65:33116.service: Deactivated successfully. Dec 13 14:15:56.431269 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:15:56.440032 systemd-logind[1803]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:15:56.425000 audit[2052]: CRED_DISP pid=2052 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:56.449503 kernel: audit: type=1106 audit(1734099356.425:204): pid=2052 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:56.449604 kernel: audit: type=1104 audit(1734099356.425:205): pid=2052 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:56.461378 kernel: audit: type=1131 audit(1734099356.428:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.31.121:22-139.178.89.65:33116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:56.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.31.121:22-139.178.89.65:33116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:56.460201 systemd-logind[1803]: Removed session 6. Dec 13 14:15:56.462227 systemd[1]: Started sshd@6-172.31.31.121:22-139.178.89.65:33132.service. Dec 13 14:15:56.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.31.121:22-139.178.89.65:33132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:56.628000 audit[2082]: USER_ACCT pid=2082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:56.630160 sshd[2082]: Accepted publickey for core from 139.178.89.65 port 33132 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:56.630000 audit[2082]: CRED_ACQ pid=2082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:56.630000 audit[2082]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffef714d40 a2=3 a3=1 items=0 ppid=1 pid=2082 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:56.630000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:15:56.632670 sshd[2082]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:56.640222 systemd-logind[1803]: New session 7 of user core. Dec 13 14:15:56.641142 systemd[1]: Started session-7.scope. Dec 13 14:15:56.649000 audit[2082]: USER_START pid=2082 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:56.652000 audit[2084]: CRED_ACQ pid=2084 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:56.748000 audit[2085]: USER_ACCT pid=2085 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:56.749661 sudo[2085]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:15:56.749000 audit[2085]: CRED_REFR pid=2085 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:56.751067 sudo[2085]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:15:56.753000 audit[2085]: USER_START pid=2085 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:15:56.799822 systemd[1]: Starting docker.service... Dec 13 14:15:56.875856 env[2095]: time="2024-12-13T14:15:56.875765693Z" level=info msg="Starting up" Dec 13 14:15:56.878890 env[2095]: time="2024-12-13T14:15:56.878843726Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:15:56.879141 env[2095]: time="2024-12-13T14:15:56.879079569Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:15:56.879301 env[2095]: time="2024-12-13T14:15:56.879267855Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:15:56.879408 env[2095]: time="2024-12-13T14:15:56.879381141Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:15:56.882531 env[2095]: time="2024-12-13T14:15:56.882484881Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:15:56.882711 env[2095]: time="2024-12-13T14:15:56.882682679Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:15:56.882856 env[2095]: time="2024-12-13T14:15:56.882823684Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:15:56.882965 env[2095]: time="2024-12-13T14:15:56.882937916Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:15:56.896609 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport432201154-merged.mount: Deactivated successfully. Dec 13 14:15:56.937574 env[2095]: time="2024-12-13T14:15:56.937464574Z" level=info msg="Loading containers: start." Dec 13 14:15:57.032000 audit[2126]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=2126 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:57.032000 audit[2126]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffee06d980 a2=0 a3=1 items=0 ppid=2095 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.032000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 14:15:57.037000 audit[2128]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2128 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:57.037000 audit[2128]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffe0228440 a2=0 a3=1 items=0 ppid=2095 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.037000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 14:15:57.042000 audit[2130]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=2130 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:57.042000 audit[2130]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffd2e98ba0 a2=0 a3=1 items=0 ppid=2095 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.042000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:15:57.046000 audit[2132]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=2132 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:57.046000 audit[2132]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffead35340 a2=0 a3=1 items=0 ppid=2095 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.046000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:15:57.061000 audit[2134]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2134 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:57.061000 audit[2134]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc887f790 a2=0 a3=1 items=0 ppid=2095 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.061000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 14:15:57.090000 audit[2139]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=2139 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:57.090000 audit[2139]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffee8494d0 a2=0 a3=1 items=0 ppid=2095 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.090000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 14:15:57.102000 audit[2141]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=2141 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:57.102000 audit[2141]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff0c79c70 a2=0 a3=1 items=0 ppid=2095 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.102000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 14:15:57.107000 audit[2143]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2143 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:57.107000 audit[2143]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffe593bb40 a2=0 a3=1 items=0 ppid=2095 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.107000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 14:15:57.111000 audit[2145]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2145 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:57.111000 audit[2145]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffc81492c0 a2=0 a3=1 items=0 ppid=2095 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.111000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:15:57.125000 audit[2149]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2149 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:57.125000 audit[2149]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffffd74c00 a2=0 a3=1 items=0 ppid=2095 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.125000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:15:57.132000 audit[2150]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2150 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:57.132000 audit[2150]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffff470fd10 a2=0 a3=1 items=0 ppid=2095 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.132000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:15:57.152146 kernel: Initializing XFRM netlink socket Dec 13 14:15:57.199301 env[2095]: time="2024-12-13T14:15:57.199242467Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 14:15:57.203169 (udev-worker)[2106]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:15:57.233000 audit[2158]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:57.233000 audit[2158]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffedf32220 a2=0 a3=1 items=0 ppid=2095 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.233000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 14:15:57.247000 audit[2161]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2161 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:57.247000 audit[2161]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffd7f4fdd0 a2=0 a3=1 items=0 ppid=2095 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.247000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 14:15:57.254000 audit[2164]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2164 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:57.254000 audit[2164]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffcbebdb00 a2=0 a3=1 items=0 ppid=2095 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.254000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 14:15:57.259000 audit[2166]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2166 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:57.259000 audit[2166]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd5155cc0 a2=0 a3=1 items=0 ppid=2095 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.259000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 14:15:57.263000 audit[2168]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2168 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:57.263000 audit[2168]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffeecf37d0 a2=0 a3=1 items=0 ppid=2095 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.263000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 14:15:57.267000 audit[2170]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2170 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:57.267000 audit[2170]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffe0f67e50 a2=0 a3=1 items=0 ppid=2095 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.267000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 14:15:57.272000 audit[2172]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:57.272000 audit[2172]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffc3754530 a2=0 a3=1 items=0 ppid=2095 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.272000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 14:15:57.296000 audit[2175]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:57.296000 audit[2175]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffd503a4a0 a2=0 a3=1 items=0 ppid=2095 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.296000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 14:15:57.303000 audit[2177]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2177 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:57.303000 audit[2177]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=fffff91dfe60 a2=0 a3=1 items=0 ppid=2095 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.303000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:15:57.307000 audit[2179]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2179 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:57.307000 audit[2179]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=fffffca2a020 a2=0 a3=1 items=0 ppid=2095 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.307000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:15:57.311000 audit[2181]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:57.311000 audit[2181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffa84cbc0 a2=0 a3=1 items=0 ppid=2095 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.311000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 14:15:57.313481 systemd-networkd[1534]: docker0: Link UP Dec 13 14:15:57.326000 audit[2185]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2185 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:57.326000 audit[2185]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc365c940 a2=0 a3=1 items=0 ppid=2095 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.326000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:15:57.338000 audit[2186]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:15:57.338000 audit[2186]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffc46c00a0 a2=0 a3=1 items=0 ppid=2095 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.338000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:15:57.340732 env[2095]: time="2024-12-13T14:15:57.340674958Z" level=info msg="Loading containers: done." Dec 13 14:15:57.366848 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck4190607954-merged.mount: Deactivated successfully. Dec 13 14:15:57.377032 env[2095]: time="2024-12-13T14:15:57.376943524Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 14:15:57.377400 env[2095]: time="2024-12-13T14:15:57.377335515Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 14:15:57.377643 env[2095]: time="2024-12-13T14:15:57.377581978Z" level=info msg="Daemon has completed initialization" Dec 13 14:15:57.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:57.401058 systemd[1]: Started docker.service. Dec 13 14:15:57.417271 env[2095]: time="2024-12-13T14:15:57.417194848Z" level=info msg="API listen on /run/docker.sock" Dec 13 14:15:58.643252 env[1814]: time="2024-12-13T14:15:58.643188359Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\"" Dec 13 14:15:59.268429 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1415247762.mount: Deactivated successfully. Dec 13 14:15:59.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:59.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:59.658636 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:15:59.658986 systemd[1]: Stopped kubelet.service. Dec 13 14:15:59.659087 systemd[1]: kubelet.service: Consumed 1.424s CPU time. Dec 13 14:15:59.661742 systemd[1]: Starting kubelet.service... Dec 13 14:16:00.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:00.002570 systemd[1]: Started kubelet.service. Dec 13 14:16:00.090822 kubelet[2224]: E1213 14:16:00.090734 2224 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:16:00.097974 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:16:00.098328 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:16:00.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:16:01.182505 amazon-ssm-agent[1790]: 2024-12-13 14:16:01 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Dec 13 14:16:01.447033 env[1814]: time="2024-12-13T14:16:01.446891768Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:01.449523 env[1814]: time="2024-12-13T14:16:01.449470930Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3e1123d6ebadbafa6eb77a9047f23f20befbbe2f177eb473a81b27a5de8c2ec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:01.452901 env[1814]: time="2024-12-13T14:16:01.452848143Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:01.456294 env[1814]: time="2024-12-13T14:16:01.456239719Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:ace6a943b058439bd6daeb74f152e7c36e6fc0b5e481cdff9364cd6ca0473e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:01.457917 env[1814]: time="2024-12-13T14:16:01.457868061Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\" returns image reference \"sha256:3e1123d6ebadbafa6eb77a9047f23f20befbbe2f177eb473a81b27a5de8c2ec5\"" Dec 13 14:16:01.459058 env[1814]: time="2024-12-13T14:16:01.459010480Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\"" Dec 13 14:16:03.600847 env[1814]: time="2024-12-13T14:16:03.600783224Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:03.604630 env[1814]: time="2024-12-13T14:16:03.604555209Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5369864a42bf2c01d3ad462832526b7d3e40620c0e75fecefbffc203562ad55,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:03.609009 env[1814]: time="2024-12-13T14:16:03.608950933Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:03.614886 env[1814]: time="2024-12-13T14:16:03.614800167Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:4bd1d4a449e7a1a4f375bd7c71abf48a95f8949b38f725ded255077329f21f7b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:03.615680 env[1814]: time="2024-12-13T14:16:03.615612980Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\" returns image reference \"sha256:d5369864a42bf2c01d3ad462832526b7d3e40620c0e75fecefbffc203562ad55\"" Dec 13 14:16:03.617685 env[1814]: time="2024-12-13T14:16:03.617632549Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\"" Dec 13 14:16:05.418469 env[1814]: time="2024-12-13T14:16:05.418401992Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:05.422405 env[1814]: time="2024-12-13T14:16:05.422330214Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d99fc9a32f6b42ab5537eec09d599efae0f61c109406dae1ba255cec288fcb95,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:05.426840 env[1814]: time="2024-12-13T14:16:05.426789277Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:05.431895 env[1814]: time="2024-12-13T14:16:05.431843851Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:1a3081cb7d21763d22eb2c0781cc462d89f501ed523ad558dea1226f128fbfdd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:05.434257 env[1814]: time="2024-12-13T14:16:05.434159785Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\" returns image reference \"sha256:d99fc9a32f6b42ab5537eec09d599efae0f61c109406dae1ba255cec288fcb95\"" Dec 13 14:16:05.434953 env[1814]: time="2024-12-13T14:16:05.434906392Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\"" Dec 13 14:16:06.822544 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1124325994.mount: Deactivated successfully. Dec 13 14:16:07.704813 env[1814]: time="2024-12-13T14:16:07.704752891Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:07.706878 env[1814]: time="2024-12-13T14:16:07.706831450Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:34e142197cb996099cc1e98902c112642b3fb3dc559140c0a95279aa8d254d3a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:07.709227 env[1814]: time="2024-12-13T14:16:07.709151100Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:07.711061 env[1814]: time="2024-12-13T14:16:07.711009524Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:1739b3febca392035bf6edfe31efdfa55226be7b57389b2001ae357f7dcb99cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:07.712128 env[1814]: time="2024-12-13T14:16:07.712038974Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\" returns image reference \"sha256:34e142197cb996099cc1e98902c112642b3fb3dc559140c0a95279aa8d254d3a\"" Dec 13 14:16:07.712766 env[1814]: time="2024-12-13T14:16:07.712722986Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 14:16:08.262678 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount395922915.mount: Deactivated successfully. Dec 13 14:16:09.606261 env[1814]: time="2024-12-13T14:16:09.606188743Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:09.609228 env[1814]: time="2024-12-13T14:16:09.609157384Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:09.613403 env[1814]: time="2024-12-13T14:16:09.613329446Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:09.617317 env[1814]: time="2024-12-13T14:16:09.617255728Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:09.619032 env[1814]: time="2024-12-13T14:16:09.618945683Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93\"" Dec 13 14:16:09.619953 env[1814]: time="2024-12-13T14:16:09.619905016Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Dec 13 14:16:10.142439 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:16:10.152485 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 14:16:10.152558 kernel: audit: type=1130 audit(1734099370.141:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:10.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:10.142744 systemd[1]: Stopped kubelet.service. Dec 13 14:16:10.147398 systemd[1]: Starting kubelet.service... Dec 13 14:16:10.161206 kernel: audit: type=1131 audit(1734099370.141:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:10.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:10.174512 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1757746947.mount: Deactivated successfully. Dec 13 14:16:10.185735 env[1814]: time="2024-12-13T14:16:10.185672624Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:10.196947 env[1814]: time="2024-12-13T14:16:10.196863074Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:10.199948 env[1814]: time="2024-12-13T14:16:10.199871251Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:10.203862 env[1814]: time="2024-12-13T14:16:10.203783396Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:10.206529 env[1814]: time="2024-12-13T14:16:10.205291521Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8\"" Dec 13 14:16:10.207356 env[1814]: time="2024-12-13T14:16:10.207294561Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" Dec 13 14:16:10.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:10.450943 systemd[1]: Started kubelet.service. Dec 13 14:16:10.459163 kernel: audit: type=1130 audit(1734099370.450:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:10.546382 kubelet[2234]: E1213 14:16:10.546233 2234 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:16:10.550459 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:16:10.550779 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:16:10.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:16:10.559135 kernel: audit: type=1131 audit(1734099370.550:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:16:10.744630 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3758539140.mount: Deactivated successfully. Dec 13 14:16:14.326861 env[1814]: time="2024-12-13T14:16:14.326797509Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:14.329657 env[1814]: time="2024-12-13T14:16:14.329604561Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:27e3830e1402783674d8b594038967deea9d51f0d91b34c93c8f39d2f68af7da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:14.333519 env[1814]: time="2024-12-13T14:16:14.333462563Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:14.337240 env[1814]: time="2024-12-13T14:16:14.337183667Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:14.339144 env[1814]: time="2024-12-13T14:16:14.339053619Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:27e3830e1402783674d8b594038967deea9d51f0d91b34c93c8f39d2f68af7da\"" Dec 13 14:16:16.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:16.966707 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 14:16:16.975145 kernel: audit: type=1131 audit(1734099376.965:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:17.000000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:16:17.000000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:16:17.005806 kernel: audit: type=1334 audit(1734099377.000:250): prog-id=40 op=UNLOAD Dec 13 14:16:17.005891 kernel: audit: type=1334 audit(1734099377.000:251): prog-id=39 op=UNLOAD Dec 13 14:16:17.005946 kernel: audit: type=1334 audit(1734099377.000:252): prog-id=38 op=UNLOAD Dec 13 14:16:17.000000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:16:20.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:20.801011 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 14:16:20.801376 systemd[1]: Stopped kubelet.service. Dec 13 14:16:20.807435 systemd[1]: Starting kubelet.service... Dec 13 14:16:20.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:20.817147 kernel: audit: type=1130 audit(1734099380.800:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:20.817289 kernel: audit: type=1131 audit(1734099380.800:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:21.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:21.106079 systemd[1]: Started kubelet.service. Dec 13 14:16:21.116319 kernel: audit: type=1130 audit(1734099381.105:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:21.212034 kubelet[2261]: E1213 14:16:21.211971 2261 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:16:21.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:16:21.216046 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:16:21.216385 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:16:21.226185 kernel: audit: type=1131 audit(1734099381.215:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:16:22.394381 systemd[1]: Stopped kubelet.service. Dec 13 14:16:22.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:22.403584 systemd[1]: Starting kubelet.service... Dec 13 14:16:22.414391 kernel: audit: type=1130 audit(1734099382.394:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:22.414546 kernel: audit: type=1131 audit(1734099382.398:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:22.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:22.476943 systemd[1]: Reloading. Dec 13 14:16:22.637958 /usr/lib/systemd/system-generators/torcx-generator[2296]: time="2024-12-13T14:16:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:16:22.638036 /usr/lib/systemd/system-generators/torcx-generator[2296]: time="2024-12-13T14:16:22Z" level=info msg="torcx already run" Dec 13 14:16:22.836456 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:16:22.836495 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:16:22.877151 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:16:23.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.060836 kernel: audit: type=1400 audit(1734099383.045:259): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.060961 kernel: audit: type=1400 audit(1734099383.052:260): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.067931 kernel: audit: type=1400 audit(1734099383.052:261): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.075237 kernel: audit: type=1400 audit(1734099383.052:262): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.089145 kernel: audit: type=1400 audit(1734099383.052:263): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.089221 kernel: audit: type=1400 audit(1734099383.052:264): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.089283 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:16:23.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.098289 kernel: audit: type=1400 audit(1734099383.052:265): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.052000 audit: BPF prog-id=43 op=LOAD Dec 13 14:16:23.052000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:16:23.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.059000 audit: BPF prog-id=44 op=LOAD Dec 13 14:16:23.059000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:16:23.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.060000 audit: BPF prog-id=45 op=LOAD Dec 13 14:16:23.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.066000 audit: BPF prog-id=46 op=LOAD Dec 13 14:16:23.066000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:16:23.066000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:16:23.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.073000 audit: BPF prog-id=47 op=LOAD Dec 13 14:16:23.074000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:16:23.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.081000 audit: BPF prog-id=48 op=LOAD Dec 13 14:16:23.081000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:16:23.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.097000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:16:23.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.100000 audit: BPF prog-id=52 op=LOAD Dec 13 14:16:23.100000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:16:23.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.100000 audit: BPF prog-id=53 op=LOAD Dec 13 14:16:23.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.100000 audit: BPF prog-id=54 op=LOAD Dec 13 14:16:23.100000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:16:23.100000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:16:23.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.102000 audit: BPF prog-id=55 op=LOAD Dec 13 14:16:23.102000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:16:23.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.107000 audit: BPF prog-id=56 op=LOAD Dec 13 14:16:23.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:23.107000 audit: BPF prog-id=57 op=LOAD Dec 13 14:16:23.107000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:16:23.107000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:16:23.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:23.152446 systemd[1]: Started kubelet.service. Dec 13 14:16:23.166121 systemd[1]: Stopping kubelet.service... Dec 13 14:16:23.167207 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:16:23.167613 systemd[1]: Stopped kubelet.service. Dec 13 14:16:23.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:23.171496 systemd[1]: Starting kubelet.service... Dec 13 14:16:23.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:23.455463 systemd[1]: Started kubelet.service. Dec 13 14:16:23.540313 kubelet[2361]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:16:23.540313 kubelet[2361]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:16:23.540313 kubelet[2361]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:16:23.540924 kubelet[2361]: I1213 14:16:23.540499 2361 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:16:24.015334 kubelet[2361]: I1213 14:16:24.015268 2361 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 14:16:24.015334 kubelet[2361]: I1213 14:16:24.015318 2361 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:16:24.015770 kubelet[2361]: I1213 14:16:24.015727 2361 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 14:16:24.094171 kubelet[2361]: E1213 14:16:24.094077 2361 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://172.31.31.121:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 172.31.31.121:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:16:24.096008 kubelet[2361]: I1213 14:16:24.095949 2361 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:16:24.108745 kubelet[2361]: E1213 14:16:24.108675 2361 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 14:16:24.108745 kubelet[2361]: I1213 14:16:24.108732 2361 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 14:16:24.116059 kubelet[2361]: I1213 14:16:24.115990 2361 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:16:24.116364 kubelet[2361]: I1213 14:16:24.116326 2361 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 14:16:24.116673 kubelet[2361]: I1213 14:16:24.116618 2361 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:16:24.117173 kubelet[2361]: I1213 14:16:24.116672 2361 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-31-121","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 14:16:24.117379 kubelet[2361]: I1213 14:16:24.117227 2361 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:16:24.117379 kubelet[2361]: I1213 14:16:24.117251 2361 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 14:16:24.117504 kubelet[2361]: I1213 14:16:24.117443 2361 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:16:24.121294 kubelet[2361]: I1213 14:16:24.121237 2361 kubelet.go:408] "Attempting to sync node with API server" Dec 13 14:16:24.121440 kubelet[2361]: I1213 14:16:24.121312 2361 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:16:24.121440 kubelet[2361]: I1213 14:16:24.121365 2361 kubelet.go:314] "Adding apiserver pod source" Dec 13 14:16:24.121440 kubelet[2361]: I1213 14:16:24.121400 2361 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:16:24.125825 kubelet[2361]: I1213 14:16:24.125782 2361 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:16:24.133520 kubelet[2361]: I1213 14:16:24.133484 2361 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:16:24.135880 kubelet[2361]: W1213 14:16:24.135852 2361 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:16:24.137082 kubelet[2361]: I1213 14:16:24.137043 2361 server.go:1269] "Started kubelet" Dec 13 14:16:24.160000 audit[2361]: AVC avc: denied { mac_admin } for pid=2361 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:24.160000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:16:24.160000 audit[2361]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40005fb740 a1=4000670ba0 a2=40005fb6e0 a3=25 items=0 ppid=1 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:24.160000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:16:24.161817 kubelet[2361]: I1213 14:16:24.161773 2361 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:16:24.160000 audit[2361]: AVC avc: denied { mac_admin } for pid=2361 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:24.160000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:16:24.160000 audit[2361]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000abae60 a1=4000670bb8 a2=40005fb860 a3=25 items=0 ppid=1 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:24.160000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:16:24.162509 kubelet[2361]: I1213 14:16:24.162470 2361 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:16:24.162724 kubelet[2361]: W1213 14:16:24.162647 2361 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.31.121:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-31-121&limit=500&resourceVersion=0": dial tcp 172.31.31.121:6443: connect: connection refused Dec 13 14:16:24.162801 kubelet[2361]: E1213 14:16:24.162746 2361 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.31.31.121:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-31-121&limit=500&resourceVersion=0\": dial tcp 172.31.31.121:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:16:24.163880 kubelet[2361]: I1213 14:16:24.163848 2361 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:16:24.165574 kubelet[2361]: E1213 14:16:24.163041 2361 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.31.121:6443/api/v1/namespaces/default/events\": dial tcp 172.31.31.121:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-31-121.1810c233c4b5ab2d default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-31-121,UID:ip-172-31-31-121,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-31-121,},FirstTimestamp:2024-12-13 14:16:24.137001773 +0000 UTC m=+0.672169741,LastTimestamp:2024-12-13 14:16:24.137001773 +0000 UTC m=+0.672169741,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-31-121,}" Dec 13 14:16:24.169651 kubelet[2361]: I1213 14:16:24.169591 2361 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:16:24.169000 audit[2371]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:24.169000 audit[2371]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffef0e8550 a2=0 a3=1 items=0 ppid=2361 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:24.169000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:16:24.171780 kubelet[2361]: I1213 14:16:24.171702 2361 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:16:24.175000 audit[2373]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:24.175000 audit[2373]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc38bc160 a2=0 a3=1 items=0 ppid=2361 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:24.175000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:16:24.179192 kubelet[2361]: I1213 14:16:24.179087 2361 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:16:24.179356 kubelet[2361]: I1213 14:16:24.172862 2361 server.go:460] "Adding debug handlers to kubelet server" Dec 13 14:16:24.180212 kubelet[2361]: E1213 14:16:24.180074 2361 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.31.121:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-31-121?timeout=10s\": dial tcp 172.31.31.121:6443: connect: connection refused" interval="200ms" Dec 13 14:16:24.181083 kubelet[2361]: I1213 14:16:24.177824 2361 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 14:16:24.181824 kubelet[2361]: I1213 14:16:24.177860 2361 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 14:16:24.181824 kubelet[2361]: I1213 14:16:24.181484 2361 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:16:24.181824 kubelet[2361]: E1213 14:16:24.178053 2361 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-31-121\" not found" Dec 13 14:16:24.181824 kubelet[2361]: I1213 14:16:24.172358 2361 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 14:16:24.182385 kubelet[2361]: E1213 14:16:24.182336 2361 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:16:24.183189 kubelet[2361]: W1213 14:16:24.169707 2361 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.31.121:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 172.31.31.121:6443: connect: connection refused Dec 13 14:16:24.183319 kubelet[2361]: E1213 14:16:24.183258 2361 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://172.31.31.121:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.31.31.121:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:16:24.183319 kubelet[2361]: W1213 14:16:24.179863 2361 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.31.121:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.31.121:6443: connect: connection refused Dec 13 14:16:24.183430 kubelet[2361]: E1213 14:16:24.183342 2361 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://172.31.31.121:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.31.31.121:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:16:24.183430 kubelet[2361]: I1213 14:16:24.180706 2361 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:16:24.183825 kubelet[2361]: I1213 14:16:24.183777 2361 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:16:24.186984 kubelet[2361]: I1213 14:16:24.186948 2361 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:16:24.188000 audit[2375]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:24.188000 audit[2375]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdba132b0 a2=0 a3=1 items=0 ppid=2361 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:24.188000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:16:24.203000 audit[2379]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2379 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:24.203000 audit[2379]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff66dde70 a2=0 a3=1 items=0 ppid=2361 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:24.203000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:16:24.214967 kubelet[2361]: I1213 14:16:24.214934 2361 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:16:24.215206 kubelet[2361]: I1213 14:16:24.215182 2361 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:16:24.215414 kubelet[2361]: I1213 14:16:24.215334 2361 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:16:24.218067 kubelet[2361]: I1213 14:16:24.218030 2361 policy_none.go:49] "None policy: Start" Dec 13 14:16:24.219522 kubelet[2361]: I1213 14:16:24.219482 2361 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:16:24.219752 kubelet[2361]: I1213 14:16:24.219727 2361 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:16:24.230187 kubelet[2361]: I1213 14:16:24.230136 2361 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:16:24.231246 systemd[1]: Created slice kubepods.slice. Dec 13 14:16:24.228000 audit[2383]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:24.228000 audit[2383]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffcf008060 a2=0 a3=1 items=0 ppid=2361 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:24.228000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:16:24.232000 audit[2385]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:24.232000 audit[2385]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcf93dc70 a2=0 a3=1 items=0 ppid=2361 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:24.232000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:16:24.232000 audit[2384]: NETFILTER_CFG table=mangle:32 family=10 entries=2 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:24.232000 audit[2384]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd29f0690 a2=0 a3=1 items=0 ppid=2361 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:24.232000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:16:24.234375 kubelet[2361]: I1213 14:16:24.234339 2361 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:16:24.234526 kubelet[2361]: I1213 14:16:24.234505 2361 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:16:24.234651 kubelet[2361]: I1213 14:16:24.234630 2361 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 14:16:24.234829 kubelet[2361]: E1213 14:16:24.234799 2361 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:16:24.235000 audit[2386]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:24.235000 audit[2386]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe9018ac0 a2=0 a3=1 items=0 ppid=2361 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:24.235000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:16:24.236000 audit[2387]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:24.236000 audit[2387]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc394e470 a2=0 a3=1 items=0 ppid=2361 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:24.236000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:16:24.238000 audit[2388]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:24.238000 audit[2388]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcd440ec0 a2=0 a3=1 items=0 ppid=2361 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:24.238000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:16:24.239000 audit[2389]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:24.239000 audit[2389]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffffb61110 a2=0 a3=1 items=0 ppid=2361 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:24.239000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:16:24.242000 audit[2390]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2390 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:24.242000 audit[2390]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdb89ee20 a2=0 a3=1 items=0 ppid=2361 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:24.242000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:16:24.244521 kubelet[2361]: W1213 14:16:24.244446 2361 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.31.121:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.31.121:6443: connect: connection refused Dec 13 14:16:24.244762 kubelet[2361]: E1213 14:16:24.244714 2361 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://172.31.31.121:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.31.31.121:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:16:24.255990 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:16:24.266590 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:16:24.275072 kubelet[2361]: I1213 14:16:24.275033 2361 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:16:24.274000 audit[2361]: AVC avc: denied { mac_admin } for pid=2361 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:24.274000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:16:24.274000 audit[2361]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000e4cc00 a1=4000e3bb30 a2=4000e4cbd0 a3=25 items=0 ppid=1 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:24.274000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:16:24.275789 kubelet[2361]: I1213 14:16:24.275756 2361 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:16:24.276130 kubelet[2361]: I1213 14:16:24.276077 2361 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 14:16:24.276276 kubelet[2361]: I1213 14:16:24.276226 2361 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:16:24.280261 kubelet[2361]: I1213 14:16:24.280214 2361 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:16:24.284191 kubelet[2361]: E1213 14:16:24.284152 2361 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-31-121\" not found" Dec 13 14:16:24.349738 systemd[1]: Created slice kubepods-burstable-pod37d8083d1eafb9a033219c47e40f2d2d.slice. Dec 13 14:16:24.381042 systemd[1]: Created slice kubepods-burstable-podb28db8f8decb033889b077a6bd28a8ec.slice. Dec 13 14:16:24.384222 kubelet[2361]: I1213 14:16:24.383968 2361 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-31-121" Dec 13 14:16:24.385261 kubelet[2361]: E1213 14:16:24.385212 2361 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.31.31.121:6443/api/v1/nodes\": dial tcp 172.31.31.121:6443: connect: connection refused" node="ip-172-31-31-121" Dec 13 14:16:24.386456 kubelet[2361]: E1213 14:16:24.385340 2361 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.31.121:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-31-121?timeout=10s\": dial tcp 172.31.31.121:6443: connect: connection refused" interval="400ms" Dec 13 14:16:24.392090 systemd[1]: Created slice kubepods-burstable-pod11501d12cb6033605743779dff3ada03.slice. Dec 13 14:16:24.482129 kubelet[2361]: I1213 14:16:24.482005 2361 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/37d8083d1eafb9a033219c47e40f2d2d-ca-certs\") pod \"kube-apiserver-ip-172-31-31-121\" (UID: \"37d8083d1eafb9a033219c47e40f2d2d\") " pod="kube-system/kube-apiserver-ip-172-31-31-121" Dec 13 14:16:24.482286 kubelet[2361]: I1213 14:16:24.482174 2361 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/37d8083d1eafb9a033219c47e40f2d2d-k8s-certs\") pod \"kube-apiserver-ip-172-31-31-121\" (UID: \"37d8083d1eafb9a033219c47e40f2d2d\") " pod="kube-system/kube-apiserver-ip-172-31-31-121" Dec 13 14:16:24.482353 kubelet[2361]: I1213 14:16:24.482309 2361 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b28db8f8decb033889b077a6bd28a8ec-k8s-certs\") pod \"kube-controller-manager-ip-172-31-31-121\" (UID: \"b28db8f8decb033889b077a6bd28a8ec\") " pod="kube-system/kube-controller-manager-ip-172-31-31-121" Dec 13 14:16:24.482414 kubelet[2361]: I1213 14:16:24.482351 2361 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b28db8f8decb033889b077a6bd28a8ec-kubeconfig\") pod \"kube-controller-manager-ip-172-31-31-121\" (UID: \"b28db8f8decb033889b077a6bd28a8ec\") " pod="kube-system/kube-controller-manager-ip-172-31-31-121" Dec 13 14:16:24.482475 kubelet[2361]: I1213 14:16:24.482415 2361 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/11501d12cb6033605743779dff3ada03-kubeconfig\") pod \"kube-scheduler-ip-172-31-31-121\" (UID: \"11501d12cb6033605743779dff3ada03\") " pod="kube-system/kube-scheduler-ip-172-31-31-121" Dec 13 14:16:24.482569 kubelet[2361]: I1213 14:16:24.482457 2361 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/37d8083d1eafb9a033219c47e40f2d2d-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-31-121\" (UID: \"37d8083d1eafb9a033219c47e40f2d2d\") " pod="kube-system/kube-apiserver-ip-172-31-31-121" Dec 13 14:16:24.482569 kubelet[2361]: I1213 14:16:24.482528 2361 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b28db8f8decb033889b077a6bd28a8ec-ca-certs\") pod \"kube-controller-manager-ip-172-31-31-121\" (UID: \"b28db8f8decb033889b077a6bd28a8ec\") " pod="kube-system/kube-controller-manager-ip-172-31-31-121" Dec 13 14:16:24.482680 kubelet[2361]: I1213 14:16:24.482590 2361 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b28db8f8decb033889b077a6bd28a8ec-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-31-121\" (UID: \"b28db8f8decb033889b077a6bd28a8ec\") " pod="kube-system/kube-controller-manager-ip-172-31-31-121" Dec 13 14:16:24.482680 kubelet[2361]: I1213 14:16:24.482628 2361 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b28db8f8decb033889b077a6bd28a8ec-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-31-121\" (UID: \"b28db8f8decb033889b077a6bd28a8ec\") " pod="kube-system/kube-controller-manager-ip-172-31-31-121" Dec 13 14:16:24.589518 kubelet[2361]: I1213 14:16:24.589480 2361 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-31-121" Dec 13 14:16:24.590615 kubelet[2361]: E1213 14:16:24.590568 2361 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.31.31.121:6443/api/v1/nodes\": dial tcp 172.31.31.121:6443: connect: connection refused" node="ip-172-31-31-121" Dec 13 14:16:24.679467 env[1814]: time="2024-12-13T14:16:24.679393984Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-31-121,Uid:37d8083d1eafb9a033219c47e40f2d2d,Namespace:kube-system,Attempt:0,}" Dec 13 14:16:24.691768 env[1814]: time="2024-12-13T14:16:24.691692157Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-31-121,Uid:b28db8f8decb033889b077a6bd28a8ec,Namespace:kube-system,Attempt:0,}" Dec 13 14:16:24.698490 env[1814]: time="2024-12-13T14:16:24.698435678Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-31-121,Uid:11501d12cb6033605743779dff3ada03,Namespace:kube-system,Attempt:0,}" Dec 13 14:16:24.788218 kubelet[2361]: E1213 14:16:24.788153 2361 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.31.121:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-31-121?timeout=10s\": dial tcp 172.31.31.121:6443: connect: connection refused" interval="800ms" Dec 13 14:16:24.994812 kubelet[2361]: I1213 14:16:24.994069 2361 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-31-121" Dec 13 14:16:24.994812 kubelet[2361]: E1213 14:16:24.994659 2361 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.31.31.121:6443/api/v1/nodes\": dial tcp 172.31.31.121:6443: connect: connection refused" node="ip-172-31-31-121" Dec 13 14:16:25.163332 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount540271199.mount: Deactivated successfully. Dec 13 14:16:25.170662 env[1814]: time="2024-12-13T14:16:25.170600793Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:25.176326 env[1814]: time="2024-12-13T14:16:25.176256962Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:25.177871 env[1814]: time="2024-12-13T14:16:25.177759095Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:25.180756 env[1814]: time="2024-12-13T14:16:25.180688527Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:25.183821 env[1814]: time="2024-12-13T14:16:25.183769811Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:25.186916 env[1814]: time="2024-12-13T14:16:25.186853050Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:25.192962 env[1814]: time="2024-12-13T14:16:25.192905287Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:25.198882 env[1814]: time="2024-12-13T14:16:25.198826901Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:25.200636 env[1814]: time="2024-12-13T14:16:25.200588348Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:25.202328 env[1814]: time="2024-12-13T14:16:25.202275345Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:25.204028 env[1814]: time="2024-12-13T14:16:25.203978362Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:25.205646 env[1814]: time="2024-12-13T14:16:25.205597990Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:25.235459 kubelet[2361]: W1213 14:16:25.234831 2361 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.31.121:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.31.121:6443: connect: connection refused Dec 13 14:16:25.235459 kubelet[2361]: E1213 14:16:25.234936 2361 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://172.31.31.121:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.31.31.121:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:16:25.245487 env[1814]: time="2024-12-13T14:16:25.244743258Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:16:25.245487 env[1814]: time="2024-12-13T14:16:25.244819447Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:16:25.245487 env[1814]: time="2024-12-13T14:16:25.244844888Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:16:25.246809 env[1814]: time="2024-12-13T14:16:25.246166561Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b19daee948e0ef3df64d19694c4e495a3a38cc18662099d848b7948a96e7faa4 pid=2401 runtime=io.containerd.runc.v2 Dec 13 14:16:25.270224 env[1814]: time="2024-12-13T14:16:25.269885706Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:16:25.270224 env[1814]: time="2024-12-13T14:16:25.269956903Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:16:25.270224 env[1814]: time="2024-12-13T14:16:25.269982980Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:16:25.271337 kubelet[2361]: W1213 14:16:25.271185 2361 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.31.121:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-31-121&limit=500&resourceVersion=0": dial tcp 172.31.31.121:6443: connect: connection refused Dec 13 14:16:25.271337 kubelet[2361]: E1213 14:16:25.271281 2361 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.31.31.121:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-31-121&limit=500&resourceVersion=0\": dial tcp 172.31.31.121:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:16:25.272492 env[1814]: time="2024-12-13T14:16:25.271865077Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9038c42288d94ef6f554eeafd0a7ecbe52123befbc73db04a0a7ea0dac58e3d3 pid=2420 runtime=io.containerd.runc.v2 Dec 13 14:16:25.285875 env[1814]: time="2024-12-13T14:16:25.285754050Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:16:25.286248 env[1814]: time="2024-12-13T14:16:25.286190212Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:16:25.286477 env[1814]: time="2024-12-13T14:16:25.286413669Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:16:25.286905 env[1814]: time="2024-12-13T14:16:25.286844694Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c73ab37547341129f9e412adea10fd6db3b284ca2d0018803b7f31788bde5333 pid=2437 runtime=io.containerd.runc.v2 Dec 13 14:16:25.292769 kubelet[2361]: E1213 14:16:25.292542 2361 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.31.121:6443/api/v1/namespaces/default/events\": dial tcp 172.31.31.121:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-31-121.1810c233c4b5ab2d default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-31-121,UID:ip-172-31-31-121,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-31-121,},FirstTimestamp:2024-12-13 14:16:24.137001773 +0000 UTC m=+0.672169741,LastTimestamp:2024-12-13 14:16:24.137001773 +0000 UTC m=+0.672169741,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-31-121,}" Dec 13 14:16:25.297728 systemd[1]: Started cri-containerd-b19daee948e0ef3df64d19694c4e495a3a38cc18662099d848b7948a96e7faa4.scope. Dec 13 14:16:25.314422 systemd[1]: Started cri-containerd-9038c42288d94ef6f554eeafd0a7ecbe52123befbc73db04a0a7ea0dac58e3d3.scope. Dec 13 14:16:25.317997 kubelet[2361]: W1213 14:16:25.317876 2361 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.31.121:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 172.31.31.121:6443: connect: connection refused Dec 13 14:16:25.318231 kubelet[2361]: E1213 14:16:25.318190 2361 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://172.31.31.121:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.31.31.121:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:16:25.359657 systemd[1]: Started cri-containerd-c73ab37547341129f9e412adea10fd6db3b284ca2d0018803b7f31788bde5333.scope. Dec 13 14:16:25.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.364000 audit: BPF prog-id=58 op=LOAD Dec 13 14:16:25.365000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.365000 audit[2421]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2401 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231396461656539343865306566336466363464313936393463346534 Dec 13 14:16:25.366000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.366000 audit[2421]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2401 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231396461656539343865306566336466363464313936393463346534 Dec 13 14:16:25.367000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.367000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.367000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.367000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.367000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.367000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.367000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.367000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.367000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.367000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.367000 audit: BPF prog-id=59 op=LOAD Dec 13 14:16:25.367000 audit[2421]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2401 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231396461656539343865306566336466363464313936393463346534 Dec 13 14:16:25.370000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.370000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.370000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.370000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.370000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.370000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.370000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.370000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.370000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.370000 audit: BPF prog-id=60 op=LOAD Dec 13 14:16:25.370000 audit[2421]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2401 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231396461656539343865306566336466363464313936393463346534 Dec 13 14:16:25.372000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:16:25.372000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:16:25.372000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.372000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.372000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.372000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.372000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.372000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.373000 audit: BPF prog-id=61 op=LOAD Dec 13 14:16:25.372000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.372000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.372000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.374000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.374000 audit[2440]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2420 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930333863343232383864393465663666353534656561666430613765 Dec 13 14:16:25.374000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.374000 audit[2440]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2420 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930333863343232383864393465663666353534656561666430613765 Dec 13 14:16:25.374000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.374000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.374000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.374000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.374000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.374000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.374000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.374000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.374000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.374000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.374000 audit: BPF prog-id=62 op=LOAD Dec 13 14:16:25.374000 audit[2440]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2420 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930333863343232383864393465663666353534656561666430613765 Dec 13 14:16:25.374000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.374000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.374000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.374000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.374000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.374000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.374000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.374000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.374000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.374000 audit: BPF prog-id=63 op=LOAD Dec 13 14:16:25.374000 audit[2440]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2420 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930333863343232383864393465663666353534656561666430613765 Dec 13 14:16:25.375000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:16:25.375000 audit: BPF prog-id=62 op=UNLOAD Dec 13 14:16:25.375000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.375000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.375000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.375000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.375000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.375000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.375000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.375000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.375000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.375000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.375000 audit: BPF prog-id=64 op=LOAD Dec 13 14:16:25.375000 audit[2440]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2420 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930333863343232383864393465663666353534656561666430613765 Dec 13 14:16:25.372000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.372000 audit: BPF prog-id=65 op=LOAD Dec 13 14:16:25.372000 audit[2421]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2401 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231396461656539343865306566336466363464313936393463346534 Dec 13 14:16:25.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.409000 audit: BPF prog-id=66 op=LOAD Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=2437 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337336162333735343733343131323966396534313261646561313066 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2437 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337336162333735343733343131323966396534313261646561313066 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit: BPF prog-id=67 op=LOAD Dec 13 14:16:25.410000 audit[2458]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2437 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337336162333735343733343131323966396534313261646561313066 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit: BPF prog-id=68 op=LOAD Dec 13 14:16:25.410000 audit[2458]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2437 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337336162333735343733343131323966396534313261646561313066 Dec 13 14:16:25.410000 audit: BPF prog-id=68 op=UNLOAD Dec 13 14:16:25.410000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.410000 audit: BPF prog-id=69 op=LOAD Dec 13 14:16:25.410000 audit[2458]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2437 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337336162333735343733343131323966396534313261646561313066 Dec 13 14:16:25.468147 env[1814]: time="2024-12-13T14:16:25.468043622Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-31-121,Uid:11501d12cb6033605743779dff3ada03,Namespace:kube-system,Attempt:0,} returns sandbox id \"c73ab37547341129f9e412adea10fd6db3b284ca2d0018803b7f31788bde5333\"" Dec 13 14:16:25.473879 env[1814]: time="2024-12-13T14:16:25.473817572Z" level=info msg="CreateContainer within sandbox \"c73ab37547341129f9e412adea10fd6db3b284ca2d0018803b7f31788bde5333\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 14:16:25.489295 env[1814]: time="2024-12-13T14:16:25.489220907Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-31-121,Uid:37d8083d1eafb9a033219c47e40f2d2d,Namespace:kube-system,Attempt:0,} returns sandbox id \"9038c42288d94ef6f554eeafd0a7ecbe52123befbc73db04a0a7ea0dac58e3d3\"" Dec 13 14:16:25.495970 env[1814]: time="2024-12-13T14:16:25.495782291Z" level=info msg="CreateContainer within sandbox \"9038c42288d94ef6f554eeafd0a7ecbe52123befbc73db04a0a7ea0dac58e3d3\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 14:16:25.499216 env[1814]: time="2024-12-13T14:16:25.499159813Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-31-121,Uid:b28db8f8decb033889b077a6bd28a8ec,Namespace:kube-system,Attempt:0,} returns sandbox id \"b19daee948e0ef3df64d19694c4e495a3a38cc18662099d848b7948a96e7faa4\"" Dec 13 14:16:25.503541 env[1814]: time="2024-12-13T14:16:25.503486904Z" level=info msg="CreateContainer within sandbox \"b19daee948e0ef3df64d19694c4e495a3a38cc18662099d848b7948a96e7faa4\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 14:16:25.518347 env[1814]: time="2024-12-13T14:16:25.518276269Z" level=info msg="CreateContainer within sandbox \"c73ab37547341129f9e412adea10fd6db3b284ca2d0018803b7f31788bde5333\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"29b32031dcb9e018467f3ac5392dab5839833031d310a75ce7cccc62234597f3\"" Dec 13 14:16:25.519588 env[1814]: time="2024-12-13T14:16:25.519517360Z" level=info msg="StartContainer for \"29b32031dcb9e018467f3ac5392dab5839833031d310a75ce7cccc62234597f3\"" Dec 13 14:16:25.534903 env[1814]: time="2024-12-13T14:16:25.534818548Z" level=info msg="CreateContainer within sandbox \"9038c42288d94ef6f554eeafd0a7ecbe52123befbc73db04a0a7ea0dac58e3d3\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"6fc3f89ad60fddfc0c47c585fa02bdf3a98a3a92f023a48e7f443ea4ba1b65b3\"" Dec 13 14:16:25.536504 env[1814]: time="2024-12-13T14:16:25.536422311Z" level=info msg="StartContainer for \"6fc3f89ad60fddfc0c47c585fa02bdf3a98a3a92f023a48e7f443ea4ba1b65b3\"" Dec 13 14:16:25.556902 systemd[1]: Started cri-containerd-29b32031dcb9e018467f3ac5392dab5839833031d310a75ce7cccc62234597f3.scope. Dec 13 14:16:25.563360 env[1814]: time="2024-12-13T14:16:25.563289929Z" level=info msg="CreateContainer within sandbox \"b19daee948e0ef3df64d19694c4e495a3a38cc18662099d848b7948a96e7faa4\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"c7f21b708565ace2974165dbc43e1b7ded8b6e13090066b3ff97ae959b1a08f7\"" Dec 13 14:16:25.567543 env[1814]: time="2024-12-13T14:16:25.567479113Z" level=info msg="StartContainer for \"c7f21b708565ace2974165dbc43e1b7ded8b6e13090066b3ff97ae959b1a08f7\"" Dec 13 14:16:25.589781 kubelet[2361]: E1213 14:16:25.589665 2361 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.31.121:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-31-121?timeout=10s\": dial tcp 172.31.31.121:6443: connect: connection refused" interval="1.6s" Dec 13 14:16:25.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.604000 audit: BPF prog-id=70 op=LOAD Dec 13 14:16:25.606000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.606000 audit[2527]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2437 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239623332303331646362396530313834363766336163353339326461 Dec 13 14:16:25.606000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.606000 audit[2527]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2437 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239623332303331646362396530313834363766336163353339326461 Dec 13 14:16:25.606000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.606000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.606000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.606000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.606000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.606000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.606000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.606000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.606000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.606000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.606000 audit: BPF prog-id=71 op=LOAD Dec 13 14:16:25.606000 audit[2527]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2437 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239623332303331646362396530313834363766336163353339326461 Dec 13 14:16:25.607000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.607000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.607000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.607000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.607000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.607000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.607000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.607000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.607000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.607000 audit: BPF prog-id=72 op=LOAD Dec 13 14:16:25.607000 audit[2527]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2437 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239623332303331646362396530313834363766336163353339326461 Dec 13 14:16:25.607000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:16:25.607000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:16:25.607000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.607000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.607000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.607000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.607000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.607000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.607000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.607000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.607000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.607000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.607000 audit: BPF prog-id=73 op=LOAD Dec 13 14:16:25.607000 audit[2527]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2437 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239623332303331646362396530313834363766336163353339326461 Dec 13 14:16:25.636633 systemd[1]: Started cri-containerd-c7f21b708565ace2974165dbc43e1b7ded8b6e13090066b3ff97ae959b1a08f7.scope. Dec 13 14:16:25.662976 systemd[1]: Started cri-containerd-6fc3f89ad60fddfc0c47c585fa02bdf3a98a3a92f023a48e7f443ea4ba1b65b3.scope. Dec 13 14:16:25.688774 env[1814]: time="2024-12-13T14:16:25.688688387Z" level=info msg="StartContainer for \"29b32031dcb9e018467f3ac5392dab5839833031d310a75ce7cccc62234597f3\" returns successfully" Dec 13 14:16:25.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.698000 audit: BPF prog-id=74 op=LOAD Dec 13 14:16:25.700000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.700000 audit[2559]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2401 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337663231623730383536356163653239373431363564626334336531 Dec 13 14:16:25.700000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.700000 audit[2559]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2401 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337663231623730383536356163653239373431363564626334336531 Dec 13 14:16:25.701000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.701000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.701000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.701000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.701000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.701000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.701000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.701000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.701000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.701000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.701000 audit: BPF prog-id=75 op=LOAD Dec 13 14:16:25.701000 audit[2559]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2401 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337663231623730383536356163653239373431363564626334336531 Dec 13 14:16:25.702000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.702000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.702000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.702000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.702000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.702000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.702000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.702000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.702000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.702000 audit: BPF prog-id=76 op=LOAD Dec 13 14:16:25.702000 audit[2559]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2401 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337663231623730383536356163653239373431363564626334336531 Dec 13 14:16:25.703000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:16:25.704000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:16:25.704000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.704000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.704000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.704000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.704000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.704000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.704000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.704000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.704000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.704000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.704000 audit: BPF prog-id=77 op=LOAD Dec 13 14:16:25.704000 audit[2559]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2401 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337663231623730383536356163653239373431363564626334336531 Dec 13 14:16:25.719043 kubelet[2361]: W1213 14:16:25.718722 2361 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.31.121:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.31.121:6443: connect: connection refused Dec 13 14:16:25.719043 kubelet[2361]: E1213 14:16:25.718893 2361 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://172.31.31.121:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.31.31.121:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:16:25.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.730000 audit: BPF prog-id=78 op=LOAD Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2420 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666633366383961643630666464666330633437633538356661303262 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2420 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666633366383961643630666464666330633437633538356661303262 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit: BPF prog-id=79 op=LOAD Dec 13 14:16:25.731000 audit[2558]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2420 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666633366383961643630666464666330633437633538356661303262 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit: BPF prog-id=80 op=LOAD Dec 13 14:16:25.731000 audit[2558]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2420 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666633366383961643630666464666330633437633538356661303262 Dec 13 14:16:25.731000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:16:25.731000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:25.731000 audit: BPF prog-id=81 op=LOAD Dec 13 14:16:25.731000 audit[2558]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2420 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666633366383961643630666464666330633437633538356661303262 Dec 13 14:16:25.804169 env[1814]: time="2024-12-13T14:16:25.796244277Z" level=info msg="StartContainer for \"c7f21b708565ace2974165dbc43e1b7ded8b6e13090066b3ff97ae959b1a08f7\" returns successfully" Dec 13 14:16:25.807112 kubelet[2361]: I1213 14:16:25.806465 2361 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-31-121" Dec 13 14:16:25.807112 kubelet[2361]: E1213 14:16:25.806961 2361 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.31.31.121:6443/api/v1/nodes\": dial tcp 172.31.31.121:6443: connect: connection refused" node="ip-172-31-31-121" Dec 13 14:16:25.818239 env[1814]: time="2024-12-13T14:16:25.818174003Z" level=info msg="StartContainer for \"6fc3f89ad60fddfc0c47c585fa02bdf3a98a3a92f023a48e7f443ea4ba1b65b3\" returns successfully" Dec 13 14:16:27.410091 kubelet[2361]: I1213 14:16:27.410053 2361 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-31-121" Dec 13 14:16:28.949834 kernel: kauditd_printk_skb: 617 callbacks suppressed Dec 13 14:16:28.950023 kernel: audit: type=1400 audit(1734099388.938:527): avc: denied { watch } for pid=2591 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7330 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:28.938000 audit[2591]: AVC avc: denied { watch } for pid=2591 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7330 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:28.938000 audit[2591]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=43 a1=4007089440 a2=fc6 a3=0 items=0 ppid=2420 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 key=(null) Dec 13 14:16:28.963712 kernel: audit: type=1300 audit(1734099388.938:527): arch=c00000b7 syscall=27 success=no exit=-13 a0=43 a1=4007089440 a2=fc6 a3=0 items=0 ppid=2420 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 key=(null) Dec 13 14:16:28.938000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E313231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:16:28.949000 audit[2591]: AVC avc: denied { watch } for pid=2591 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:28.990582 kernel: audit: type=1327 audit(1734099388.938:527): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E313231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:16:28.990732 kernel: audit: type=1400 audit(1734099388.949:528): avc: denied { watch } for pid=2591 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:28.949000 audit[2591]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=43 a1=4006cd7e60 a2=fc6 a3=0 items=0 ppid=2420 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 key=(null) Dec 13 14:16:29.004962 kernel: audit: type=1300 audit(1734099388.949:528): arch=c00000b7 syscall=27 success=no exit=-13 a0=43 a1=4006cd7e60 a2=fc6 a3=0 items=0 ppid=2420 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 key=(null) Dec 13 14:16:28.949000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E313231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:16:29.016728 kernel: audit: type=1327 audit(1734099388.949:528): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E313231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:16:28.963000 audit[2591]: AVC avc: denied { watch } for pid=2591 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=7328 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:29.062567 kernel: audit: type=1400 audit(1734099388.963:529): avc: denied { watch } for pid=2591 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=7328 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:29.062742 kernel: audit: type=1300 audit(1734099388.963:529): arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=4007089bc0 a2=fc6 a3=0 items=0 ppid=2420 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 key=(null) Dec 13 14:16:29.062803 kernel: audit: type=1327 audit(1734099388.963:529): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E313231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:16:28.963000 audit[2591]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=4007089bc0 a2=fc6 a3=0 items=0 ppid=2420 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 key=(null) Dec 13 14:16:28.963000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E313231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:16:28.966000 audit[2591]: AVC avc: denied { watch } for pid=2591 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=7332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:28.966000 audit[2591]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4c a1=4007089c80 a2=fc6 a3=0 items=0 ppid=2420 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 key=(null) Dec 13 14:16:28.966000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E313231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:16:29.081149 kernel: audit: type=1400 audit(1734099388.966:530): avc: denied { watch } for pid=2591 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=7332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:29.227000 audit[2591]: AVC avc: denied { watch } for pid=2591 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:29.227000 audit[2591]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=47 a1=4003f9a460 a2=fc6 a3=0 items=0 ppid=2420 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 key=(null) Dec 13 14:16:29.227000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E313231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:16:29.227000 audit[2591]: AVC avc: denied { watch } for pid=2591 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7330 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:29.227000 audit[2591]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=47 a1=4006caaf30 a2=fc6 a3=0 items=0 ppid=2420 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 key=(null) Dec 13 14:16:29.227000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E313231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:16:29.291000 audit[2577]: AVC avc: denied { watch } for pid=2577 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7330 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:29.291000 audit[2577]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40002c5110 a2=fc6 a3=0 items=0 ppid=2401 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 key=(null) Dec 13 14:16:29.291000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:16:29.292000 audit[2577]: AVC avc: denied { watch } for pid=2577 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:29.292000 audit[2577]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000ce07a0 a2=fc6 a3=0 items=0 ppid=2401 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 key=(null) Dec 13 14:16:29.292000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:16:29.460145 kubelet[2361]: I1213 14:16:29.460031 2361 kubelet_node_status.go:75] "Successfully registered node" node="ip-172-31-31-121" Dec 13 14:16:29.460787 kubelet[2361]: E1213 14:16:29.460154 2361 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"ip-172-31-31-121\": node \"ip-172-31-31-121\" not found" Dec 13 14:16:29.501217 kubelet[2361]: E1213 14:16:29.501044 2361 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-31-121\" not found" Dec 13 14:16:29.562602 kubelet[2361]: E1213 14:16:29.562547 2361 controller.go:145] "Failed to ensure lease exists, will retry" err="namespaces \"kube-node-lease\" not found" interval="3.2s" Dec 13 14:16:30.167418 kubelet[2361]: I1213 14:16:30.167372 2361 apiserver.go:52] "Watching apiserver" Dec 13 14:16:30.182504 kubelet[2361]: I1213 14:16:30.182459 2361 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 14:16:31.212800 amazon-ssm-agent[1790]: 2024-12-13 14:16:31 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Dec 13 14:16:31.438124 update_engine[1804]: I1213 14:16:31.438055 1804 update_attempter.cc:509] Updating boot flags... Dec 13 14:16:31.797000 audit[2577]: AVC avc: denied { watch } for pid=2577 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:16:31.797000 audit[2577]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000c0c140 a2=fc6 a3=0 items=0 ppid=2401 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 key=(null) Dec 13 14:16:31.797000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:16:31.974264 systemd[1]: Reloading. Dec 13 14:16:32.229910 /usr/lib/systemd/system-generators/torcx-generator[2826]: time="2024-12-13T14:16:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:16:32.229965 /usr/lib/systemd/system-generators/torcx-generator[2826]: time="2024-12-13T14:16:32Z" level=info msg="torcx already run" Dec 13 14:16:32.534648 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:16:32.534699 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:16:32.584035 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:16:32.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.801000 audit: BPF prog-id=82 op=LOAD Dec 13 14:16:32.802000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:16:32.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.805000 audit: BPF prog-id=83 op=LOAD Dec 13 14:16:32.805000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:16:32.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.806000 audit: BPF prog-id=84 op=LOAD Dec 13 14:16:32.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.808000 audit: BPF prog-id=85 op=LOAD Dec 13 14:16:32.808000 audit: BPF prog-id=45 op=UNLOAD Dec 13 14:16:32.808000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:16:32.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.812000 audit: BPF prog-id=86 op=LOAD Dec 13 14:16:32.812000 audit: BPF prog-id=47 op=UNLOAD Dec 13 14:16:32.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.816000 audit: BPF prog-id=87 op=LOAD Dec 13 14:16:32.816000 audit: BPF prog-id=61 op=UNLOAD Dec 13 14:16:32.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.821000 audit: BPF prog-id=88 op=LOAD Dec 13 14:16:32.821000 audit: BPF prog-id=48 op=UNLOAD Dec 13 14:16:32.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.824000 audit: BPF prog-id=89 op=LOAD Dec 13 14:16:32.824000 audit: BPF prog-id=58 op=UNLOAD Dec 13 14:16:32.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.826000 audit: BPF prog-id=90 op=LOAD Dec 13 14:16:32.826000 audit: BPF prog-id=49 op=UNLOAD Dec 13 14:16:32.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.828000 audit: BPF prog-id=91 op=LOAD Dec 13 14:16:32.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.829000 audit: BPF prog-id=92 op=LOAD Dec 13 14:16:32.829000 audit: BPF prog-id=50 op=UNLOAD Dec 13 14:16:32.829000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:16:32.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.831000 audit: BPF prog-id=93 op=LOAD Dec 13 14:16:32.831000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:16:32.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.834000 audit: BPF prog-id=94 op=LOAD Dec 13 14:16:32.834000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:16:32.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.837000 audit: BPF prog-id=95 op=LOAD Dec 13 14:16:32.837000 audit: BPF prog-id=52 op=UNLOAD Dec 13 14:16:32.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.839000 audit: BPF prog-id=96 op=LOAD Dec 13 14:16:32.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.840000 audit: BPF prog-id=97 op=LOAD Dec 13 14:16:32.840000 audit: BPF prog-id=53 op=UNLOAD Dec 13 14:16:32.840000 audit: BPF prog-id=54 op=UNLOAD Dec 13 14:16:32.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.843000 audit: BPF prog-id=98 op=LOAD Dec 13 14:16:32.844000 audit: BPF prog-id=55 op=UNLOAD Dec 13 14:16:32.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.852000 audit: BPF prog-id=99 op=LOAD Dec 13 14:16:32.852000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:16:32.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.856000 audit: BPF prog-id=100 op=LOAD Dec 13 14:16:32.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.857000 audit: BPF prog-id=101 op=LOAD Dec 13 14:16:32.858000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:16:32.858000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:16:32.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:32.862000 audit: BPF prog-id=102 op=LOAD Dec 13 14:16:32.862000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:16:32.993592 systemd[1]: Stopping kubelet.service... Dec 13 14:16:33.014792 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:16:33.015443 systemd[1]: Stopped kubelet.service. Dec 13 14:16:33.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:33.016421 systemd[1]: kubelet.service: Consumed 1.363s CPU time. Dec 13 14:16:33.020299 systemd[1]: Starting kubelet.service... Dec 13 14:16:33.310000 audit[2577]: AVC avc: denied { watch } for pid=2577 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:33.310000 audit[2577]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000aee420 a2=fc6 a3=0 items=0 ppid=2401 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 key=(null) Dec 13 14:16:33.310000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:16:33.311000 audit[2577]: AVC avc: denied { watch } for pid=2577 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:33.311000 audit[2577]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000aee5e0 a2=fc6 a3=0 items=0 ppid=2401 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 key=(null) Dec 13 14:16:33.311000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:16:33.313000 audit[2577]: AVC avc: denied { watch } for pid=2577 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:33.313000 audit[2577]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000aee7a0 a2=fc6 a3=0 items=0 ppid=2401 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 key=(null) Dec 13 14:16:33.315000 audit[2577]: AVC avc: denied { watch } for pid=2577 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:33.315000 audit[2577]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000aee960 a2=fc6 a3=0 items=0 ppid=2401 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 key=(null) Dec 13 14:16:33.315000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:16:33.313000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:16:33.325466 systemd[1]: Started kubelet.service. Dec 13 14:16:33.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:33.427637 kubelet[2977]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:16:33.428708 kubelet[2977]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:16:33.428887 kubelet[2977]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:16:33.429246 kubelet[2977]: I1213 14:16:33.429191 2977 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:16:33.443842 kubelet[2977]: I1213 14:16:33.443739 2977 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 14:16:33.443842 kubelet[2977]: I1213 14:16:33.443791 2977 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:16:33.444454 kubelet[2977]: I1213 14:16:33.444419 2977 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 14:16:33.450042 kubelet[2977]: I1213 14:16:33.449998 2977 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 14:16:33.457039 kubelet[2977]: I1213 14:16:33.456997 2977 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:16:33.470022 kubelet[2977]: E1213 14:16:33.469972 2977 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 14:16:33.470301 kubelet[2977]: I1213 14:16:33.470266 2977 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 14:16:33.479670 kubelet[2977]: I1213 14:16:33.478991 2977 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:16:33.479670 kubelet[2977]: I1213 14:16:33.479374 2977 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 14:16:33.479910 kubelet[2977]: I1213 14:16:33.479770 2977 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:16:33.480398 kubelet[2977]: I1213 14:16:33.479824 2977 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-31-121","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 14:16:33.480398 kubelet[2977]: I1213 14:16:33.480158 2977 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:16:33.480398 kubelet[2977]: I1213 14:16:33.480205 2977 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 14:16:33.480398 kubelet[2977]: I1213 14:16:33.480262 2977 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:16:33.480796 kubelet[2977]: I1213 14:16:33.480445 2977 kubelet.go:408] "Attempting to sync node with API server" Dec 13 14:16:33.480796 kubelet[2977]: I1213 14:16:33.480468 2977 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:16:33.480796 kubelet[2977]: I1213 14:16:33.480511 2977 kubelet.go:314] "Adding apiserver pod source" Dec 13 14:16:33.480796 kubelet[2977]: I1213 14:16:33.480539 2977 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:16:33.486123 kubelet[2977]: I1213 14:16:33.486069 2977 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:16:33.487611 kubelet[2977]: I1213 14:16:33.487277 2977 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:16:33.490846 kubelet[2977]: I1213 14:16:33.490767 2977 server.go:1269] "Started kubelet" Dec 13 14:16:33.504036 kubelet[2977]: I1213 14:16:33.503979 2977 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:16:33.504285 kubelet[2977]: I1213 14:16:33.504255 2977 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:16:33.502000 audit[2977]: AVC avc: denied { mac_admin } for pid=2977 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.502000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:16:33.502000 audit[2977]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400084be60 a1=4000c764e0 a2=400084be30 a3=25 items=0 ppid=1 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.502000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:16:33.503000 audit[2977]: AVC avc: denied { mac_admin } for pid=2977 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.503000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:16:33.503000 audit[2977]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000703f00 a1=4000c764f8 a2=400084bef0 a3=25 items=0 ppid=1 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.503000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:16:33.505559 kubelet[2977]: I1213 14:16:33.505529 2977 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:16:33.532205 kubelet[2977]: I1213 14:16:33.532141 2977 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:16:33.535695 kubelet[2977]: I1213 14:16:33.535658 2977 server.go:460] "Adding debug handlers to kubelet server" Dec 13 14:16:33.539062 kubelet[2977]: I1213 14:16:33.537473 2977 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:16:33.539625 kubelet[2977]: I1213 14:16:33.539594 2977 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:16:33.552851 kubelet[2977]: I1213 14:16:33.552810 2977 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 14:16:33.562692 kubelet[2977]: I1213 14:16:33.562256 2977 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 14:16:33.565825 kubelet[2977]: E1213 14:16:33.565766 2977 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ip-172-31-31-121\" not found" Dec 13 14:16:33.586815 kubelet[2977]: I1213 14:16:33.586759 2977 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 14:16:33.586815 kubelet[2977]: I1213 14:16:33.587052 2977 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:16:33.598950 kubelet[2977]: E1213 14:16:33.598896 2977 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:16:33.601921 kubelet[2977]: I1213 14:16:33.601828 2977 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:16:33.601921 kubelet[2977]: I1213 14:16:33.601911 2977 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:16:33.604834 kubelet[2977]: I1213 14:16:33.602067 2977 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:16:33.646479 kubelet[2977]: I1213 14:16:33.646402 2977 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:16:33.650199 kubelet[2977]: I1213 14:16:33.649716 2977 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:16:33.650199 kubelet[2977]: I1213 14:16:33.649798 2977 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:16:33.650199 kubelet[2977]: I1213 14:16:33.649830 2977 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 14:16:33.650199 kubelet[2977]: E1213 14:16:33.649906 2977 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:16:33.754915 kubelet[2977]: E1213 14:16:33.753708 2977 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 14:16:33.771847 kubelet[2977]: I1213 14:16:33.771271 2977 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:16:33.771847 kubelet[2977]: I1213 14:16:33.771327 2977 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:16:33.771847 kubelet[2977]: I1213 14:16:33.771384 2977 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:16:33.771847 kubelet[2977]: I1213 14:16:33.771783 2977 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 14:16:33.772259 kubelet[2977]: I1213 14:16:33.771848 2977 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 14:16:33.772259 kubelet[2977]: I1213 14:16:33.771890 2977 policy_none.go:49] "None policy: Start" Dec 13 14:16:33.773386 kubelet[2977]: I1213 14:16:33.773323 2977 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:16:33.773546 kubelet[2977]: I1213 14:16:33.773400 2977 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:16:33.774148 kubelet[2977]: I1213 14:16:33.774084 2977 state_mem.go:75] "Updated machine memory state" Dec 13 14:16:33.791000 audit[2977]: AVC avc: denied { mac_admin } for pid=2977 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:33.791000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:16:33.791000 audit[2977]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400084bb90 a1=4000eba420 a2=400084bb60 a3=25 items=0 ppid=1 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:33.791000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:16:33.794222 kubelet[2977]: I1213 14:16:33.791970 2977 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:16:33.794222 kubelet[2977]: I1213 14:16:33.792341 2977 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:16:33.794222 kubelet[2977]: I1213 14:16:33.792592 2977 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 14:16:33.794222 kubelet[2977]: I1213 14:16:33.792617 2977 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:16:33.794222 kubelet[2977]: I1213 14:16:33.793718 2977 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:16:33.927253 kubelet[2977]: I1213 14:16:33.927132 2977 kubelet_node_status.go:72] "Attempting to register node" node="ip-172-31-31-121" Dec 13 14:16:33.945718 kubelet[2977]: I1213 14:16:33.945655 2977 kubelet_node_status.go:111] "Node was previously registered" node="ip-172-31-31-121" Dec 13 14:16:33.945914 kubelet[2977]: I1213 14:16:33.945792 2977 kubelet_node_status.go:75] "Successfully registered node" node="ip-172-31-31-121" Dec 13 14:16:33.978930 kubelet[2977]: E1213 14:16:33.978881 2977 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-31-121\" already exists" pod="kube-system/kube-apiserver-ip-172-31-31-121" Dec 13 14:16:33.988199 kubelet[2977]: I1213 14:16:33.988140 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b28db8f8decb033889b077a6bd28a8ec-ca-certs\") pod \"kube-controller-manager-ip-172-31-31-121\" (UID: \"b28db8f8decb033889b077a6bd28a8ec\") " pod="kube-system/kube-controller-manager-ip-172-31-31-121" Dec 13 14:16:33.988460 kubelet[2977]: I1213 14:16:33.988431 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b28db8f8decb033889b077a6bd28a8ec-kubeconfig\") pod \"kube-controller-manager-ip-172-31-31-121\" (UID: \"b28db8f8decb033889b077a6bd28a8ec\") " pod="kube-system/kube-controller-manager-ip-172-31-31-121" Dec 13 14:16:33.988627 kubelet[2977]: I1213 14:16:33.988596 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b28db8f8decb033889b077a6bd28a8ec-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-31-121\" (UID: \"b28db8f8decb033889b077a6bd28a8ec\") " pod="kube-system/kube-controller-manager-ip-172-31-31-121" Dec 13 14:16:33.988998 kubelet[2977]: I1213 14:16:33.988953 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/11501d12cb6033605743779dff3ada03-kubeconfig\") pod \"kube-scheduler-ip-172-31-31-121\" (UID: \"11501d12cb6033605743779dff3ada03\") " pod="kube-system/kube-scheduler-ip-172-31-31-121" Dec 13 14:16:33.989236 kubelet[2977]: I1213 14:16:33.989189 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/37d8083d1eafb9a033219c47e40f2d2d-ca-certs\") pod \"kube-apiserver-ip-172-31-31-121\" (UID: \"37d8083d1eafb9a033219c47e40f2d2d\") " pod="kube-system/kube-apiserver-ip-172-31-31-121" Dec 13 14:16:33.989395 kubelet[2977]: I1213 14:16:33.989366 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/37d8083d1eafb9a033219c47e40f2d2d-k8s-certs\") pod \"kube-apiserver-ip-172-31-31-121\" (UID: \"37d8083d1eafb9a033219c47e40f2d2d\") " pod="kube-system/kube-apiserver-ip-172-31-31-121" Dec 13 14:16:33.989594 kubelet[2977]: I1213 14:16:33.989556 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/37d8083d1eafb9a033219c47e40f2d2d-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-31-121\" (UID: \"37d8083d1eafb9a033219c47e40f2d2d\") " pod="kube-system/kube-apiserver-ip-172-31-31-121" Dec 13 14:16:33.989785 kubelet[2977]: I1213 14:16:33.989759 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b28db8f8decb033889b077a6bd28a8ec-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-31-121\" (UID: \"b28db8f8decb033889b077a6bd28a8ec\") " pod="kube-system/kube-controller-manager-ip-172-31-31-121" Dec 13 14:16:33.989970 kubelet[2977]: I1213 14:16:33.989944 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b28db8f8decb033889b077a6bd28a8ec-k8s-certs\") pod \"kube-controller-manager-ip-172-31-31-121\" (UID: \"b28db8f8decb033889b077a6bd28a8ec\") " pod="kube-system/kube-controller-manager-ip-172-31-31-121" Dec 13 14:16:34.490826 kubelet[2977]: I1213 14:16:34.490766 2977 apiserver.go:52] "Watching apiserver" Dec 13 14:16:34.587781 kubelet[2977]: I1213 14:16:34.587708 2977 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 14:16:34.863160 kubelet[2977]: I1213 14:16:34.863036 2977 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-31-121" podStartSLOduration=1.862989982 podStartE2EDuration="1.862989982s" podCreationTimestamp="2024-12-13 14:16:33 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:16:34.794928302 +0000 UTC m=+1.462436955" watchObservedRunningTime="2024-12-13 14:16:34.862989982 +0000 UTC m=+1.530498635" Dec 13 14:16:34.904552 kubelet[2977]: I1213 14:16:34.904250 2977 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-31-121" podStartSLOduration=2.904225603 podStartE2EDuration="2.904225603s" podCreationTimestamp="2024-12-13 14:16:32 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:16:34.903574858 +0000 UTC m=+1.571083487" watchObservedRunningTime="2024-12-13 14:16:34.904225603 +0000 UTC m=+1.571734232" Dec 13 14:16:34.905299 kubelet[2977]: I1213 14:16:34.905186 2977 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-31-121" podStartSLOduration=1.904990829 podStartE2EDuration="1.904990829s" podCreationTimestamp="2024-12-13 14:16:33 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:16:34.86583611 +0000 UTC m=+1.533344751" watchObservedRunningTime="2024-12-13 14:16:34.904990829 +0000 UTC m=+1.572499458" Dec 13 14:16:36.575002 kubelet[2977]: I1213 14:16:36.574885 2977 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 14:16:36.575954 env[1814]: time="2024-12-13T14:16:36.575857294Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:16:36.576517 kubelet[2977]: I1213 14:16:36.576362 2977 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 14:16:37.525541 systemd[1]: Created slice kubepods-besteffort-pod09565b93_630b_4dd7_b3f8_0781e88f7c4e.slice. Dec 13 14:16:37.537795 kubelet[2977]: W1213 14:16:37.537714 2977 reflector.go:561] object-"kube-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ip-172-31-31-121" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ip-172-31-31-121' and this object Dec 13 14:16:37.537997 kubelet[2977]: E1213 14:16:37.537792 2977 reflector.go:158] "Unhandled Error" err="object-\"kube-system\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kube-root-ca.crt\" is forbidden: User \"system:node:ip-172-31-31-121\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"kube-system\": no relationship found between node 'ip-172-31-31-121' and this object" logger="UnhandledError" Dec 13 14:16:37.537997 kubelet[2977]: W1213 14:16:37.537948 2977 reflector.go:561] object-"kube-system"/"kube-proxy": failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ip-172-31-31-121" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ip-172-31-31-121' and this object Dec 13 14:16:37.537997 kubelet[2977]: E1213 14:16:37.537977 2977 reflector.go:158] "Unhandled Error" err="object-\"kube-system\"/\"kube-proxy\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kube-proxy\" is forbidden: User \"system:node:ip-172-31-31-121\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"kube-system\": no relationship found between node 'ip-172-31-31-121' and this object" logger="UnhandledError" Dec 13 14:16:37.621406 kubelet[2977]: I1213 14:16:37.621340 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/09565b93-630b-4dd7-b3f8-0781e88f7c4e-kube-proxy\") pod \"kube-proxy-spsgb\" (UID: \"09565b93-630b-4dd7-b3f8-0781e88f7c4e\") " pod="kube-system/kube-proxy-spsgb" Dec 13 14:16:37.622152 kubelet[2977]: I1213 14:16:37.621420 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/09565b93-630b-4dd7-b3f8-0781e88f7c4e-xtables-lock\") pod \"kube-proxy-spsgb\" (UID: \"09565b93-630b-4dd7-b3f8-0781e88f7c4e\") " pod="kube-system/kube-proxy-spsgb" Dec 13 14:16:37.622152 kubelet[2977]: I1213 14:16:37.621464 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xxbl6\" (UniqueName: \"kubernetes.io/projected/09565b93-630b-4dd7-b3f8-0781e88f7c4e-kube-api-access-xxbl6\") pod \"kube-proxy-spsgb\" (UID: \"09565b93-630b-4dd7-b3f8-0781e88f7c4e\") " pod="kube-system/kube-proxy-spsgb" Dec 13 14:16:37.622152 kubelet[2977]: I1213 14:16:37.621506 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/09565b93-630b-4dd7-b3f8-0781e88f7c4e-lib-modules\") pod \"kube-proxy-spsgb\" (UID: \"09565b93-630b-4dd7-b3f8-0781e88f7c4e\") " pod="kube-system/kube-proxy-spsgb" Dec 13 14:16:37.732013 systemd[1]: Created slice kubepods-besteffort-poda3ed90c3_4313_49ea_95d3_c5d844ddfef1.slice. Dec 13 14:16:37.763821 kubelet[2977]: W1213 14:16:37.763752 2977 reflector.go:561] object-"tigera-operator"/"kubernetes-services-endpoint": failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:ip-172-31-31-121" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ip-172-31-31-121' and this object Dec 13 14:16:37.763821 kubelet[2977]: E1213 14:16:37.763819 2977 reflector.go:158] "Unhandled Error" err="object-\"tigera-operator\"/\"kubernetes-services-endpoint\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kubernetes-services-endpoint\" is forbidden: User \"system:node:ip-172-31-31-121\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"tigera-operator\": no relationship found between node 'ip-172-31-31-121' and this object" logger="UnhandledError" Dec 13 14:16:37.764134 kubelet[2977]: W1213 14:16:37.763987 2977 reflector.go:561] object-"tigera-operator"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ip-172-31-31-121" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ip-172-31-31-121' and this object Dec 13 14:16:37.764134 kubelet[2977]: E1213 14:16:37.764027 2977 reflector.go:158] "Unhandled Error" err="object-\"tigera-operator\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kube-root-ca.crt\" is forbidden: User \"system:node:ip-172-31-31-121\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"tigera-operator\": no relationship found between node 'ip-172-31-31-121' and this object" logger="UnhandledError" Dec 13 14:16:37.822965 kubelet[2977]: I1213 14:16:37.822892 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/a3ed90c3-4313-49ea-95d3-c5d844ddfef1-var-lib-calico\") pod \"tigera-operator-76c4976dd7-zbs2l\" (UID: \"a3ed90c3-4313-49ea-95d3-c5d844ddfef1\") " pod="tigera-operator/tigera-operator-76c4976dd7-zbs2l" Dec 13 14:16:37.823210 kubelet[2977]: I1213 14:16:37.822995 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6qr4b\" (UniqueName: \"kubernetes.io/projected/a3ed90c3-4313-49ea-95d3-c5d844ddfef1-kube-api-access-6qr4b\") pod \"tigera-operator-76c4976dd7-zbs2l\" (UID: \"a3ed90c3-4313-49ea-95d3-c5d844ddfef1\") " pod="tigera-operator/tigera-operator-76c4976dd7-zbs2l" Dec 13 14:16:38.723469 kubelet[2977]: E1213 14:16:38.723353 2977 configmap.go:193] Couldn't get configMap kube-system/kube-proxy: failed to sync configmap cache: timed out waiting for the condition Dec 13 14:16:38.724752 kubelet[2977]: E1213 14:16:38.724710 2977 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/09565b93-630b-4dd7-b3f8-0781e88f7c4e-kube-proxy podName:09565b93-630b-4dd7-b3f8-0781e88f7c4e nodeName:}" failed. No retries permitted until 2024-12-13 14:16:39.224672769 +0000 UTC m=+5.892181398 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-proxy" (UniqueName: "kubernetes.io/configmap/09565b93-630b-4dd7-b3f8-0781e88f7c4e-kube-proxy") pod "kube-proxy-spsgb" (UID: "09565b93-630b-4dd7-b3f8-0781e88f7c4e") : failed to sync configmap cache: timed out waiting for the condition Dec 13 14:16:38.895160 kubelet[2977]: E1213 14:16:38.895056 2977 projected.go:288] Couldn't get configMap kube-system/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Dec 13 14:16:38.895445 kubelet[2977]: E1213 14:16:38.895412 2977 projected.go:194] Error preparing data for projected volume kube-api-access-xxbl6 for pod kube-system/kube-proxy-spsgb: failed to sync configmap cache: timed out waiting for the condition Dec 13 14:16:38.895701 kubelet[2977]: E1213 14:16:38.895667 2977 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/09565b93-630b-4dd7-b3f8-0781e88f7c4e-kube-api-access-xxbl6 podName:09565b93-630b-4dd7-b3f8-0781e88f7c4e nodeName:}" failed. No retries permitted until 2024-12-13 14:16:39.395634434 +0000 UTC m=+6.063143063 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-xxbl6" (UniqueName: "kubernetes.io/projected/09565b93-630b-4dd7-b3f8-0781e88f7c4e-kube-api-access-xxbl6") pod "kube-proxy-spsgb" (UID: "09565b93-630b-4dd7-b3f8-0781e88f7c4e") : failed to sync configmap cache: timed out waiting for the condition Dec 13 14:16:38.962652 kubelet[2977]: I1213 14:16:38.962593 2977 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Dec 13 14:16:39.238942 env[1814]: time="2024-12-13T14:16:39.238270130Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-zbs2l,Uid:a3ed90c3-4313-49ea-95d3-c5d844ddfef1,Namespace:tigera-operator,Attempt:0,}" Dec 13 14:16:39.267758 env[1814]: time="2024-12-13T14:16:39.267604550Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:16:39.267758 env[1814]: time="2024-12-13T14:16:39.267698463Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:16:39.268089 env[1814]: time="2024-12-13T14:16:39.267726015Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:16:39.268817 env[1814]: time="2024-12-13T14:16:39.268719002Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/70fc2f7fb9f4cf7bf238119e991b6a350ba0d6586fa80a625b306449a5470f4c pid=3045 runtime=io.containerd.runc.v2 Dec 13 14:16:39.302057 systemd[1]: Started cri-containerd-70fc2f7fb9f4cf7bf238119e991b6a350ba0d6586fa80a625b306449a5470f4c.scope. Dec 13 14:16:39.317019 systemd[1]: run-containerd-runc-k8s.io-70fc2f7fb9f4cf7bf238119e991b6a350ba0d6586fa80a625b306449a5470f4c-runc.r0PLK6.mount: Deactivated successfully. Dec 13 14:16:39.365421 kernel: kauditd_printk_skb: 287 callbacks suppressed Dec 13 14:16:39.365573 kernel: audit: type=1400 audit(1734099399.361:789): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.378832 kernel: audit: type=1400 audit(1734099399.361:790): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.378977 kernel: audit: type=1400 audit(1734099399.362:791): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.393558 kernel: audit: type=1400 audit(1734099399.362:792): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.402906 kernel: audit: type=1400 audit(1734099399.362:793): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.403645 kernel: audit: type=1400 audit(1734099399.362:794): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.417120 kernel: audit: type=1400 audit(1734099399.362:795): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.417256 kernel: audit: type=1400 audit(1734099399.362:796): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.430943 kernel: audit: type=1400 audit(1734099399.362:797): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.437960 kernel: audit: type=1400 audit(1734099399.364:798): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.364000 audit: BPF prog-id=103 op=LOAD Dec 13 14:16:39.364000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.364000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3045 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:39.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730666332663766623966346366376266323338313139653939316236 Dec 13 14:16:39.364000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.364000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3045 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:39.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730666332663766623966346366376266323338313139653939316236 Dec 13 14:16:39.364000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.364000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.364000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.364000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.364000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.364000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.364000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.364000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.364000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.364000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.364000 audit: BPF prog-id=104 op=LOAD Dec 13 14:16:39.364000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3045 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:39.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730666332663766623966346366376266323338313139653939316236 Dec 13 14:16:39.371000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.371000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.371000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.371000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.371000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.371000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.371000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.371000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.371000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.371000 audit: BPF prog-id=105 op=LOAD Dec 13 14:16:39.371000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3045 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:39.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730666332663766623966346366376266323338313139653939316236 Dec 13 14:16:39.378000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:16:39.378000 audit: BPF prog-id=104 op=UNLOAD Dec 13 14:16:39.378000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.378000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.378000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.378000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.378000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.378000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.378000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.378000 audit[3055]: AVC avc: denied { perfmon } for pid=3055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.378000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.378000 audit[3055]: AVC avc: denied { bpf } for pid=3055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.378000 audit: BPF prog-id=106 op=LOAD Dec 13 14:16:39.378000 audit[3055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3045 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:39.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730666332663766623966346366376266323338313139653939316236 Dec 13 14:16:39.465561 env[1814]: time="2024-12-13T14:16:39.465429195Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-zbs2l,Uid:a3ed90c3-4313-49ea-95d3-c5d844ddfef1,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"70fc2f7fb9f4cf7bf238119e991b6a350ba0d6586fa80a625b306449a5470f4c\"" Dec 13 14:16:39.470386 env[1814]: time="2024-12-13T14:16:39.469415423Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 14:16:39.636003 env[1814]: time="2024-12-13T14:16:39.635949170Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-spsgb,Uid:09565b93-630b-4dd7-b3f8-0781e88f7c4e,Namespace:kube-system,Attempt:0,}" Dec 13 14:16:39.674891 env[1814]: time="2024-12-13T14:16:39.674731511Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:16:39.674891 env[1814]: time="2024-12-13T14:16:39.674837124Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:16:39.675302 env[1814]: time="2024-12-13T14:16:39.675218644Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:16:39.675820 env[1814]: time="2024-12-13T14:16:39.675750982Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4f5057b350ef1795ea414fc9fd6c51118c9a4f40300664822c1b84df3ad4a32e pid=3086 runtime=io.containerd.runc.v2 Dec 13 14:16:39.703119 systemd[1]: Started cri-containerd-4f5057b350ef1795ea414fc9fd6c51118c9a4f40300664822c1b84df3ad4a32e.scope. Dec 13 14:16:39.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.733000 audit: BPF prog-id=107 op=LOAD Dec 13 14:16:39.735000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.735000 audit[3096]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=3086 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:39.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466353035376233353065663137393565613431346663396664366335 Dec 13 14:16:39.735000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.735000 audit[3096]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3086 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:39.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466353035376233353065663137393565613431346663396664366335 Dec 13 14:16:39.736000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.736000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.736000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.736000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.736000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.736000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.736000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.736000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.736000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.736000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.736000 audit: BPF prog-id=108 op=LOAD Dec 13 14:16:39.736000 audit[3096]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=3086 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:39.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466353035376233353065663137393565613431346663396664366335 Dec 13 14:16:39.738000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.738000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.738000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.738000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.738000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.738000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.738000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.738000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.738000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.738000 audit: BPF prog-id=109 op=LOAD Dec 13 14:16:39.738000 audit[3096]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=3086 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:39.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466353035376233353065663137393565613431346663396664366335 Dec 13 14:16:39.739000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:16:39.739000 audit: BPF prog-id=108 op=UNLOAD Dec 13 14:16:39.739000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.739000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.739000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.739000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.739000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.739000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.739000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.739000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.739000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.739000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.739000 audit: BPF prog-id=110 op=LOAD Dec 13 14:16:39.739000 audit[3096]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=3086 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:39.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466353035376233353065663137393565613431346663396664366335 Dec 13 14:16:39.766926 env[1814]: time="2024-12-13T14:16:39.766855844Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-spsgb,Uid:09565b93-630b-4dd7-b3f8-0781e88f7c4e,Namespace:kube-system,Attempt:0,} returns sandbox id \"4f5057b350ef1795ea414fc9fd6c51118c9a4f40300664822c1b84df3ad4a32e\"" Dec 13 14:16:39.773707 env[1814]: time="2024-12-13T14:16:39.773641895Z" level=info msg="CreateContainer within sandbox \"4f5057b350ef1795ea414fc9fd6c51118c9a4f40300664822c1b84df3ad4a32e\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:16:39.795594 env[1814]: time="2024-12-13T14:16:39.795488028Z" level=info msg="CreateContainer within sandbox \"4f5057b350ef1795ea414fc9fd6c51118c9a4f40300664822c1b84df3ad4a32e\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"debda368939becc79f7eec14d5d0003d09a00f36eb240f6e788d213df880c182\"" Dec 13 14:16:39.796562 env[1814]: time="2024-12-13T14:16:39.796509444Z" level=info msg="StartContainer for \"debda368939becc79f7eec14d5d0003d09a00f36eb240f6e788d213df880c182\"" Dec 13 14:16:39.833341 systemd[1]: Started cri-containerd-debda368939becc79f7eec14d5d0003d09a00f36eb240f6e788d213df880c182.scope. Dec 13 14:16:39.876000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.876000 audit[3126]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40002455a0 a2=3c a3=0 items=0 ppid=3086 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:39.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465626461333638393339626563633739663765656331346435643030 Dec 13 14:16:39.877000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.877000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.877000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.877000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.877000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.877000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.877000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.877000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.877000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.877000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.877000 audit: BPF prog-id=111 op=LOAD Dec 13 14:16:39.877000 audit[3126]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40002458e0 a2=78 a3=0 items=0 ppid=3086 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:39.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465626461333638393339626563633739663765656331346435643030 Dec 13 14:16:39.878000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.878000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.878000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.878000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.878000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.878000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.878000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.878000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.878000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.878000 audit: BPF prog-id=112 op=LOAD Dec 13 14:16:39.878000 audit[3126]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000245670 a2=78 a3=0 items=0 ppid=3086 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:39.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465626461333638393339626563633739663765656331346435643030 Dec 13 14:16:39.879000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:16:39.880000 audit: BPF prog-id=111 op=UNLOAD Dec 13 14:16:39.880000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.880000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.880000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.880000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.880000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.880000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.880000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.880000 audit[3126]: AVC avc: denied { perfmon } for pid=3126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.880000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.880000 audit[3126]: AVC avc: denied { bpf } for pid=3126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:39.880000 audit: BPF prog-id=113 op=LOAD Dec 13 14:16:39.880000 audit[3126]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000245b40 a2=78 a3=0 items=0 ppid=3086 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:39.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465626461333638393339626563633739663765656331346435643030 Dec 13 14:16:39.913556 env[1814]: time="2024-12-13T14:16:39.913313370Z" level=info msg="StartContainer for \"debda368939becc79f7eec14d5d0003d09a00f36eb240f6e788d213df880c182\" returns successfully" Dec 13 14:16:40.151000 audit[3185]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=3185 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:40.151000 audit[3185]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeb2ab9c0 a2=0 a3=1 items=0 ppid=3137 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.151000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:16:40.151000 audit[3186]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=3186 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:40.151000 audit[3186]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffca591fe0 a2=0 a3=1 items=0 ppid=3137 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.151000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:16:40.153000 audit[3187]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=3187 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:40.153000 audit[3187]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcd2cfc80 a2=0 a3=1 items=0 ppid=3137 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.153000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:16:40.154000 audit[3188]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=3188 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:40.154000 audit[3188]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd9960100 a2=0 a3=1 items=0 ppid=3137 pid=3188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.154000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:16:40.155000 audit[3189]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=3189 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:40.155000 audit[3189]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc4eb3e00 a2=0 a3=1 items=0 ppid=3137 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.155000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:16:40.157000 audit[3190]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=3190 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:40.157000 audit[3190]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd2b73b10 a2=0 a3=1 items=0 ppid=3137 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.157000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:16:40.261000 audit[3191]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=3191 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:40.261000 audit[3191]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe85bdbb0 a2=0 a3=1 items=0 ppid=3137 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.261000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:16:40.271000 audit[3193]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=3193 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:40.271000 audit[3193]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffffb606e0 a2=0 a3=1 items=0 ppid=3137 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.271000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:16:40.279000 audit[3196]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=3196 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:40.279000 audit[3196]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffffcc1e9a0 a2=0 a3=1 items=0 ppid=3137 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.279000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:16:40.282000 audit[3197]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=3197 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:40.282000 audit[3197]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe3e7d5d0 a2=0 a3=1 items=0 ppid=3137 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.282000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:16:40.288000 audit[3199]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=3199 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:40.288000 audit[3199]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff2a9e370 a2=0 a3=1 items=0 ppid=3137 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.288000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:16:40.291000 audit[3200]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=3200 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:40.291000 audit[3200]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd2faffb0 a2=0 a3=1 items=0 ppid=3137 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.291000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:16:40.296000 audit[3202]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=3202 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:40.296000 audit[3202]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd4671240 a2=0 a3=1 items=0 ppid=3137 pid=3202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.296000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:16:40.304000 audit[3205]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=3205 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:40.304000 audit[3205]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe7616680 a2=0 a3=1 items=0 ppid=3137 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.304000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:16:40.306000 audit[3206]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=3206 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:40.306000 audit[3206]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe8340380 a2=0 a3=1 items=0 ppid=3137 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.306000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:16:40.313000 audit[3208]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=3208 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:40.313000 audit[3208]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff9883de0 a2=0 a3=1 items=0 ppid=3137 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.313000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:16:40.317000 audit[3209]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=3209 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:40.317000 audit[3209]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe1d63d00 a2=0 a3=1 items=0 ppid=3137 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.317000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:16:40.323000 audit[3211]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=3211 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:40.323000 audit[3211]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffedc53f60 a2=0 a3=1 items=0 ppid=3137 pid=3211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.323000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:16:40.331000 audit[3214]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3214 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:40.331000 audit[3214]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd23dfb40 a2=0 a3=1 items=0 ppid=3137 pid=3214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.331000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:16:40.341000 audit[3217]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3217 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:40.341000 audit[3217]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff87f1220 a2=0 a3=1 items=0 ppid=3137 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.341000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:16:40.344000 audit[3218]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3218 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:40.344000 audit[3218]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd4ad6aa0 a2=0 a3=1 items=0 ppid=3137 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.344000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:16:40.349000 audit[3220]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3220 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:40.349000 audit[3220]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffd76ec1c0 a2=0 a3=1 items=0 ppid=3137 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.349000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:16:40.357000 audit[3223]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3223 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:40.357000 audit[3223]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe3fea610 a2=0 a3=1 items=0 ppid=3137 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.357000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:16:40.360000 audit[3224]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3224 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:40.360000 audit[3224]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffec351100 a2=0 a3=1 items=0 ppid=3137 pid=3224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.360000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:16:40.365000 audit[3226]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3226 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:16:40.365000 audit[3226]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffc28b2fe0 a2=0 a3=1 items=0 ppid=3137 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.365000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:16:40.408000 audit[3232]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3232 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:40.408000 audit[3232]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=fffff2811870 a2=0 a3=1 items=0 ppid=3137 pid=3232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.408000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:40.423000 audit[3232]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3232 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:40.423000 audit[3232]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=fffff2811870 a2=0 a3=1 items=0 ppid=3137 pid=3232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.423000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:40.426000 audit[3237]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3237 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:40.426000 audit[3237]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff2dfb5e0 a2=0 a3=1 items=0 ppid=3137 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.426000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:16:40.432000 audit[3239]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:40.432000 audit[3239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe5fe7990 a2=0 a3=1 items=0 ppid=3137 pid=3239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.432000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:16:40.442000 audit[3242]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:40.442000 audit[3242]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe2dbb260 a2=0 a3=1 items=0 ppid=3137 pid=3242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.442000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:16:40.445000 audit[3243]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3243 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:40.445000 audit[3243]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcb2f85a0 a2=0 a3=1 items=0 ppid=3137 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.445000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:16:40.451000 audit[3245]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:40.451000 audit[3245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe98b09a0 a2=0 a3=1 items=0 ppid=3137 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.451000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:16:40.454000 audit[3246]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:40.454000 audit[3246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff7ef7d20 a2=0 a3=1 items=0 ppid=3137 pid=3246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.454000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:16:40.460000 audit[3248]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:40.460000 audit[3248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd4d56f50 a2=0 a3=1 items=0 ppid=3137 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.460000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:16:40.467000 audit[3251]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:40.467000 audit[3251]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffff7b1fda0 a2=0 a3=1 items=0 ppid=3137 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.467000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:16:40.470000 audit[3252]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:40.470000 audit[3252]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe621d2f0 a2=0 a3=1 items=0 ppid=3137 pid=3252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.470000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:16:40.476000 audit[3254]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:40.476000 audit[3254]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffed9f79f0 a2=0 a3=1 items=0 ppid=3137 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.476000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:16:40.478000 audit[3255]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:40.478000 audit[3255]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffd22f340 a2=0 a3=1 items=0 ppid=3137 pid=3255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.478000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:16:40.484000 audit[3257]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:40.484000 audit[3257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe5ca0320 a2=0 a3=1 items=0 ppid=3137 pid=3257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.484000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:16:40.493000 audit[3260]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:40.493000 audit[3260]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffea8c9e20 a2=0 a3=1 items=0 ppid=3137 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.493000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:16:40.501000 audit[3263]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:40.501000 audit[3263]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc9f11490 a2=0 a3=1 items=0 ppid=3137 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.501000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:16:40.503000 audit[3264]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3264 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:40.503000 audit[3264]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc64e5160 a2=0 a3=1 items=0 ppid=3137 pid=3264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.503000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:16:40.509000 audit[3266]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:40.509000 audit[3266]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffff0170b70 a2=0 a3=1 items=0 ppid=3137 pid=3266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.509000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:16:40.516000 audit[3269]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3269 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:40.516000 audit[3269]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffff53754d0 a2=0 a3=1 items=0 ppid=3137 pid=3269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.516000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:16:40.521000 audit[3270]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:40.521000 audit[3270]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdcfa29a0 a2=0 a3=1 items=0 ppid=3137 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.521000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:16:40.526000 audit[3272]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3272 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:40.526000 audit[3272]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffdd70bac0 a2=0 a3=1 items=0 ppid=3137 pid=3272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.526000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:16:40.528000 audit[3273]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:40.528000 audit[3273]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff436ab00 a2=0 a3=1 items=0 ppid=3137 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.528000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:16:40.534000 audit[3275]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3275 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:40.534000 audit[3275]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffbfdb110 a2=0 a3=1 items=0 ppid=3137 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.534000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:16:40.544000 audit[3278]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:16:40.544000 audit[3278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcb79f6f0 a2=0 a3=1 items=0 ppid=3137 pid=3278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.544000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:16:40.551000 audit[3280]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:16:40.551000 audit[3280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffd9dc75e0 a2=0 a3=1 items=0 ppid=3137 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.551000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:40.552000 audit[3280]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:16:40.552000 audit[3280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffd9dc75e0 a2=0 a3=1 items=0 ppid=3137 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:40.552000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:41.269438 sudo[2085]: pam_unix(sudo:session): session closed for user root Dec 13 14:16:41.268000 audit[2085]: USER_END pid=2085 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:16:41.269000 audit[2085]: CRED_DISP pid=2085 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:16:41.281409 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2620044632.mount: Deactivated successfully. Dec 13 14:16:41.294808 sshd[2082]: pam_unix(sshd:session): session closed for user core Dec 13 14:16:41.296000 audit[2082]: USER_END pid=2082 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:41.297000 audit[2082]: CRED_DISP pid=2082 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:41.300857 systemd[1]: sshd@6-172.31.31.121:22-139.178.89.65:33132.service: Deactivated successfully. Dec 13 14:16:41.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.31.121:22-139.178.89.65:33132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:41.302202 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:16:41.302526 systemd[1]: session-7.scope: Consumed 11.139s CPU time. Dec 13 14:16:41.304524 systemd-logind[1803]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:16:41.306735 systemd-logind[1803]: Removed session 7. Dec 13 14:16:42.236457 env[1814]: time="2024-12-13T14:16:42.236391194Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:42.238707 env[1814]: time="2024-12-13T14:16:42.238643207Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:30d521e4e84764b396aacbb2a373ca7a573f84571e3955b34329652acccfb73c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:42.241691 env[1814]: time="2024-12-13T14:16:42.241626928Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:42.245502 env[1814]: time="2024-12-13T14:16:42.245452206Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:42.247350 env[1814]: time="2024-12-13T14:16:42.247289664Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:30d521e4e84764b396aacbb2a373ca7a573f84571e3955b34329652acccfb73c\"" Dec 13 14:16:42.253817 env[1814]: time="2024-12-13T14:16:42.253736210Z" level=info msg="CreateContainer within sandbox \"70fc2f7fb9f4cf7bf238119e991b6a350ba0d6586fa80a625b306449a5470f4c\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 14:16:42.273554 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1100312372.mount: Deactivated successfully. Dec 13 14:16:42.287598 env[1814]: time="2024-12-13T14:16:42.287524891Z" level=info msg="CreateContainer within sandbox \"70fc2f7fb9f4cf7bf238119e991b6a350ba0d6586fa80a625b306449a5470f4c\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"779371e56ff5405a8955328075913a7604daf89fe17fe5fd7735e5e0589cfadd\"" Dec 13 14:16:42.290639 env[1814]: time="2024-12-13T14:16:42.290530441Z" level=info msg="StartContainer for \"779371e56ff5405a8955328075913a7604daf89fe17fe5fd7735e5e0589cfadd\"" Dec 13 14:16:42.330713 systemd[1]: Started cri-containerd-779371e56ff5405a8955328075913a7604daf89fe17fe5fd7735e5e0589cfadd.scope. Dec 13 14:16:42.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.370000 audit: BPF prog-id=114 op=LOAD Dec 13 14:16:42.372000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.372000 audit[3304]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014fb38 a2=10 a3=0 items=0 ppid=3045 pid=3304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:42.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737393337316535366666353430356138393535333238303735393133 Dec 13 14:16:42.372000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.372000 audit[3304]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014f5a0 a2=3c a3=0 items=0 ppid=3045 pid=3304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:42.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737393337316535366666353430356138393535333238303735393133 Dec 13 14:16:42.372000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.372000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.372000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.372000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.372000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.372000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.372000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.372000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.372000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.372000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.372000 audit: BPF prog-id=115 op=LOAD Dec 13 14:16:42.372000 audit[3304]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014f8e0 a2=78 a3=0 items=0 ppid=3045 pid=3304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:42.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737393337316535366666353430356138393535333238303735393133 Dec 13 14:16:42.374000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.374000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.374000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.374000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.374000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.374000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.374000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.374000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.374000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.374000 audit: BPF prog-id=116 op=LOAD Dec 13 14:16:42.374000 audit[3304]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014f670 a2=78 a3=0 items=0 ppid=3045 pid=3304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:42.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737393337316535366666353430356138393535333238303735393133 Dec 13 14:16:42.375000 audit: BPF prog-id=116 op=UNLOAD Dec 13 14:16:42.376000 audit: BPF prog-id=115 op=UNLOAD Dec 13 14:16:42.376000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.376000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.376000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.376000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.376000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.376000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.376000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.376000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.376000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.376000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:42.376000 audit: BPF prog-id=117 op=LOAD Dec 13 14:16:42.376000 audit[3304]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014fb40 a2=78 a3=0 items=0 ppid=3045 pid=3304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:42.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737393337316535366666353430356138393535333238303735393133 Dec 13 14:16:42.407884 env[1814]: time="2024-12-13T14:16:42.407744486Z" level=info msg="StartContainer for \"779371e56ff5405a8955328075913a7604daf89fe17fe5fd7735e5e0589cfadd\" returns successfully" Dec 13 14:16:42.751212 kubelet[2977]: I1213 14:16:42.751065 2977 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-spsgb" podStartSLOduration=5.751041056 podStartE2EDuration="5.751041056s" podCreationTimestamp="2024-12-13 14:16:37 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:16:40.746623167 +0000 UTC m=+7.414131868" watchObservedRunningTime="2024-12-13 14:16:42.751041056 +0000 UTC m=+9.418549673" Dec 13 14:16:42.752297 kubelet[2977]: I1213 14:16:42.752183 2977 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76c4976dd7-zbs2l" podStartSLOduration=2.96993451 podStartE2EDuration="5.752159899s" podCreationTimestamp="2024-12-13 14:16:37 +0000 UTC" firstStartedPulling="2024-12-13 14:16:39.468001495 +0000 UTC m=+6.135510124" lastFinishedPulling="2024-12-13 14:16:42.250226884 +0000 UTC m=+8.917735513" observedRunningTime="2024-12-13 14:16:42.752073762 +0000 UTC m=+9.419582391" watchObservedRunningTime="2024-12-13 14:16:42.752159899 +0000 UTC m=+9.419668516" Dec 13 14:16:46.881245 kernel: kauditd_printk_skb: 362 callbacks suppressed Dec 13 14:16:46.881379 kernel: audit: type=1325 audit(1734099406.872:905): table=filter:89 family=2 entries=14 op=nft_register_rule pid=3338 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:46.872000 audit[3338]: NETFILTER_CFG table=filter:89 family=2 entries=14 op=nft_register_rule pid=3338 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:46.872000 audit[3338]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffecf6cf00 a2=0 a3=1 items=0 ppid=3137 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:46.894397 kernel: audit: type=1300 audit(1734099406.872:905): arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffecf6cf00 a2=0 a3=1 items=0 ppid=3137 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:46.872000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:46.904725 kernel: audit: type=1327 audit(1734099406.872:905): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:46.895000 audit[3338]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3338 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:46.913234 kernel: audit: type=1325 audit(1734099406.895:906): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3338 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:46.895000 audit[3338]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffecf6cf00 a2=0 a3=1 items=0 ppid=3137 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:46.895000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:46.936439 kernel: audit: type=1300 audit(1734099406.895:906): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffecf6cf00 a2=0 a3=1 items=0 ppid=3137 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:46.936565 kernel: audit: type=1327 audit(1734099406.895:906): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:46.963000 audit[3340]: NETFILTER_CFG table=filter:91 family=2 entries=15 op=nft_register_rule pid=3340 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:46.963000 audit[3340]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffc046e6c0 a2=0 a3=1 items=0 ppid=3137 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:46.980844 kernel: audit: type=1325 audit(1734099406.963:907): table=filter:91 family=2 entries=15 op=nft_register_rule pid=3340 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:46.980942 kernel: audit: type=1300 audit(1734099406.963:907): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffc046e6c0 a2=0 a3=1 items=0 ppid=3137 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:46.963000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:46.986814 kernel: audit: type=1327 audit(1734099406.963:907): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:46.987000 audit[3340]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3340 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:46.987000 audit[3340]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc046e6c0 a2=0 a3=1 items=0 ppid=3137 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:46.987000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:46.996136 kernel: audit: type=1325 audit(1734099406.987:908): table=nat:92 family=2 entries=12 op=nft_register_rule pid=3340 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:47.434267 systemd[1]: Created slice kubepods-besteffort-podd98e1a52_e388_412d_ad70_96ca8c69020f.slice. Dec 13 14:16:47.499593 kubelet[2977]: I1213 14:16:47.499531 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6fhwc\" (UniqueName: \"kubernetes.io/projected/d98e1a52-e388-412d-ad70-96ca8c69020f-kube-api-access-6fhwc\") pod \"calico-typha-68dbf58468-28pzv\" (UID: \"d98e1a52-e388-412d-ad70-96ca8c69020f\") " pod="calico-system/calico-typha-68dbf58468-28pzv" Dec 13 14:16:47.500452 kubelet[2977]: I1213 14:16:47.500415 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d98e1a52-e388-412d-ad70-96ca8c69020f-tigera-ca-bundle\") pod \"calico-typha-68dbf58468-28pzv\" (UID: \"d98e1a52-e388-412d-ad70-96ca8c69020f\") " pod="calico-system/calico-typha-68dbf58468-28pzv" Dec 13 14:16:47.500643 kubelet[2977]: I1213 14:16:47.500615 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/d98e1a52-e388-412d-ad70-96ca8c69020f-typha-certs\") pod \"calico-typha-68dbf58468-28pzv\" (UID: \"d98e1a52-e388-412d-ad70-96ca8c69020f\") " pod="calico-system/calico-typha-68dbf58468-28pzv" Dec 13 14:16:47.740617 env[1814]: time="2024-12-13T14:16:47.740452788Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-68dbf58468-28pzv,Uid:d98e1a52-e388-412d-ad70-96ca8c69020f,Namespace:calico-system,Attempt:0,}" Dec 13 14:16:47.784269 systemd[1]: Created slice kubepods-besteffort-pod6787c68b_d4b4_4106_bb10_cfc9cca0f03a.slice. Dec 13 14:16:47.792520 env[1814]: time="2024-12-13T14:16:47.792351874Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:16:47.792876 env[1814]: time="2024-12-13T14:16:47.792778225Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:16:47.795079 env[1814]: time="2024-12-13T14:16:47.793067032Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:16:47.796861 env[1814]: time="2024-12-13T14:16:47.795801398Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/54fcf6b892cb5e84a352f829855ae389ce2940cbe72ff14759814a18731592a4 pid=3351 runtime=io.containerd.runc.v2 Dec 13 14:16:47.806177 kubelet[2977]: I1213 14:16:47.803758 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/6787c68b-d4b4-4106-bb10-cfc9cca0f03a-var-run-calico\") pod \"calico-node-5t44d\" (UID: \"6787c68b-d4b4-4106-bb10-cfc9cca0f03a\") " pod="calico-system/calico-node-5t44d" Dec 13 14:16:47.806177 kubelet[2977]: I1213 14:16:47.803826 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/6787c68b-d4b4-4106-bb10-cfc9cca0f03a-cni-bin-dir\") pod \"calico-node-5t44d\" (UID: \"6787c68b-d4b4-4106-bb10-cfc9cca0f03a\") " pod="calico-system/calico-node-5t44d" Dec 13 14:16:47.806177 kubelet[2977]: I1213 14:16:47.804132 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/6787c68b-d4b4-4106-bb10-cfc9cca0f03a-policysync\") pod \"calico-node-5t44d\" (UID: \"6787c68b-d4b4-4106-bb10-cfc9cca0f03a\") " pod="calico-system/calico-node-5t44d" Dec 13 14:16:47.806177 kubelet[2977]: I1213 14:16:47.804181 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6787c68b-d4b4-4106-bb10-cfc9cca0f03a-var-lib-calico\") pod \"calico-node-5t44d\" (UID: \"6787c68b-d4b4-4106-bb10-cfc9cca0f03a\") " pod="calico-system/calico-node-5t44d" Dec 13 14:16:47.806177 kubelet[2977]: I1213 14:16:47.804221 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/6787c68b-d4b4-4106-bb10-cfc9cca0f03a-cni-net-dir\") pod \"calico-node-5t44d\" (UID: \"6787c68b-d4b4-4106-bb10-cfc9cca0f03a\") " pod="calico-system/calico-node-5t44d" Dec 13 14:16:47.806618 kubelet[2977]: I1213 14:16:47.804266 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6787c68b-d4b4-4106-bb10-cfc9cca0f03a-tigera-ca-bundle\") pod \"calico-node-5t44d\" (UID: \"6787c68b-d4b4-4106-bb10-cfc9cca0f03a\") " pod="calico-system/calico-node-5t44d" Dec 13 14:16:47.806618 kubelet[2977]: I1213 14:16:47.804305 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6rhvz\" (UniqueName: \"kubernetes.io/projected/6787c68b-d4b4-4106-bb10-cfc9cca0f03a-kube-api-access-6rhvz\") pod \"calico-node-5t44d\" (UID: \"6787c68b-d4b4-4106-bb10-cfc9cca0f03a\") " pod="calico-system/calico-node-5t44d" Dec 13 14:16:47.806618 kubelet[2977]: I1213 14:16:47.804343 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6787c68b-d4b4-4106-bb10-cfc9cca0f03a-xtables-lock\") pod \"calico-node-5t44d\" (UID: \"6787c68b-d4b4-4106-bb10-cfc9cca0f03a\") " pod="calico-system/calico-node-5t44d" Dec 13 14:16:47.806618 kubelet[2977]: I1213 14:16:47.804382 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/6787c68b-d4b4-4106-bb10-cfc9cca0f03a-node-certs\") pod \"calico-node-5t44d\" (UID: \"6787c68b-d4b4-4106-bb10-cfc9cca0f03a\") " pod="calico-system/calico-node-5t44d" Dec 13 14:16:47.806618 kubelet[2977]: I1213 14:16:47.804439 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/6787c68b-d4b4-4106-bb10-cfc9cca0f03a-flexvol-driver-host\") pod \"calico-node-5t44d\" (UID: \"6787c68b-d4b4-4106-bb10-cfc9cca0f03a\") " pod="calico-system/calico-node-5t44d" Dec 13 14:16:47.806917 kubelet[2977]: I1213 14:16:47.804477 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6787c68b-d4b4-4106-bb10-cfc9cca0f03a-lib-modules\") pod \"calico-node-5t44d\" (UID: \"6787c68b-d4b4-4106-bb10-cfc9cca0f03a\") " pod="calico-system/calico-node-5t44d" Dec 13 14:16:47.806917 kubelet[2977]: I1213 14:16:47.804514 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/6787c68b-d4b4-4106-bb10-cfc9cca0f03a-cni-log-dir\") pod \"calico-node-5t44d\" (UID: \"6787c68b-d4b4-4106-bb10-cfc9cca0f03a\") " pod="calico-system/calico-node-5t44d" Dec 13 14:16:47.843528 systemd[1]: Started cri-containerd-54fcf6b892cb5e84a352f829855ae389ce2940cbe72ff14759814a18731592a4.scope. Dec 13 14:16:47.915300 kubelet[2977]: E1213 14:16:47.915260 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.915506 kubelet[2977]: W1213 14:16:47.915475 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.915735 kubelet[2977]: E1213 14:16:47.915706 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.933911 kubelet[2977]: E1213 14:16:47.933858 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:47.934065 kubelet[2977]: W1213 14:16:47.933897 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:47.934065 kubelet[2977]: E1213 14:16:47.933957 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:47.937534 kubelet[2977]: E1213 14:16:47.937442 2977 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bw5cn" podUID="cf1319c5-c836-4c8a-8002-1147cc1b3ed7" Dec 13 14:16:47.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.984000 audit: BPF prog-id=118 op=LOAD Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3351 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:47.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534666366366238393263623565383461333532663832393835356165 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3351 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:47.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534666366366238393263623565383461333532663832393835356165 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit: BPF prog-id=119 op=LOAD Dec 13 14:16:47.985000 audit[3361]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3351 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:47.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534666366366238393263623565383461333532663832393835356165 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit: BPF prog-id=120 op=LOAD Dec 13 14:16:47.985000 audit[3361]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3351 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:47.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534666366366238393263623565383461333532663832393835356165 Dec 13 14:16:47.985000 audit: BPF prog-id=120 op=UNLOAD Dec 13 14:16:47.985000 audit: BPF prog-id=119 op=UNLOAD Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:47.985000 audit: BPF prog-id=121 op=LOAD Dec 13 14:16:47.985000 audit[3361]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3351 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:47.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534666366366238393263623565383461333532663832393835356165 Dec 13 14:16:48.001984 kubelet[2977]: E1213 14:16:47.997887 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.001984 kubelet[2977]: W1213 14:16:48.000302 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.001984 kubelet[2977]: E1213 14:16:48.000374 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.003667 kubelet[2977]: E1213 14:16:48.003601 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.003667 kubelet[2977]: W1213 14:16:48.003663 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.003914 kubelet[2977]: E1213 14:16:48.003700 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.004841 kubelet[2977]: E1213 14:16:48.004586 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.004841 kubelet[2977]: W1213 14:16:48.004620 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.004841 kubelet[2977]: E1213 14:16:48.004663 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.006671 kubelet[2977]: E1213 14:16:48.006627 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.006901 kubelet[2977]: W1213 14:16:48.006868 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.007036 kubelet[2977]: E1213 14:16:48.007009 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.007775 kubelet[2977]: E1213 14:16:48.007740 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.007994 kubelet[2977]: W1213 14:16:48.007963 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.008218 kubelet[2977]: E1213 14:16:48.008191 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.009327 kubelet[2977]: E1213 14:16:48.009290 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.009512 kubelet[2977]: W1213 14:16:48.009483 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.009642 kubelet[2977]: E1213 14:16:48.009614 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.010159 kubelet[2977]: E1213 14:16:48.010132 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.010338 kubelet[2977]: W1213 14:16:48.010310 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.010459 kubelet[2977]: E1213 14:16:48.010434 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.012130 kubelet[2977]: E1213 14:16:48.012055 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.012330 kubelet[2977]: W1213 14:16:48.012299 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.012464 kubelet[2977]: E1213 14:16:48.012437 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.012994 kubelet[2977]: E1213 14:16:48.012964 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.013237 kubelet[2977]: W1213 14:16:48.013206 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.013373 kubelet[2977]: E1213 14:16:48.013348 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.014361 kubelet[2977]: E1213 14:16:48.014324 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.014554 kubelet[2977]: W1213 14:16:48.014524 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.014685 kubelet[2977]: E1213 14:16:48.014659 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.015221 kubelet[2977]: E1213 14:16:48.015192 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.015413 kubelet[2977]: W1213 14:16:48.015383 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.015555 kubelet[2977]: E1213 14:16:48.015521 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.016158 kubelet[2977]: E1213 14:16:48.016127 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.016342 kubelet[2977]: W1213 14:16:48.016314 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.016474 kubelet[2977]: E1213 14:16:48.016442 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.017271 kubelet[2977]: E1213 14:16:48.017236 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.017510 kubelet[2977]: W1213 14:16:48.017477 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.017663 kubelet[2977]: E1213 14:16:48.017636 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.020300 kubelet[2977]: E1213 14:16:48.020259 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.020500 kubelet[2977]: W1213 14:16:48.020470 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.020645 kubelet[2977]: E1213 14:16:48.020618 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.022343 kubelet[2977]: E1213 14:16:48.022302 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.022578 kubelet[2977]: W1213 14:16:48.022546 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.022901 kubelet[2977]: E1213 14:16:48.022869 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.024297 kubelet[2977]: E1213 14:16:48.024257 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.024522 kubelet[2977]: W1213 14:16:48.024492 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.024656 kubelet[2977]: E1213 14:16:48.024630 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.025491 kubelet[2977]: E1213 14:16:48.025458 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.025685 kubelet[2977]: W1213 14:16:48.025655 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.025847 kubelet[2977]: E1213 14:16:48.025821 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.026471 kubelet[2977]: E1213 14:16:48.026429 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.026651 kubelet[2977]: W1213 14:16:48.026620 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.026781 kubelet[2977]: E1213 14:16:48.026752 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.027411 kubelet[2977]: E1213 14:16:48.027374 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.027602 kubelet[2977]: W1213 14:16:48.027571 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.027774 kubelet[2977]: E1213 14:16:48.027745 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.025000 audit[3395]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=3395 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:48.029872 kubelet[2977]: E1213 14:16:48.029837 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.030047 kubelet[2977]: W1213 14:16:48.030016 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.030225 kubelet[2977]: E1213 14:16:48.030198 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.025000 audit[3395]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=fffff02af750 a2=0 a3=1 items=0 ppid=3137 pid=3395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:48.025000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:48.031385 kubelet[2977]: E1213 14:16:48.031352 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.031537 kubelet[2977]: W1213 14:16:48.031504 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.031672 kubelet[2977]: E1213 14:16:48.031645 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.031873 kubelet[2977]: I1213 14:16:48.031843 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/cf1319c5-c836-4c8a-8002-1147cc1b3ed7-socket-dir\") pod \"csi-node-driver-bw5cn\" (UID: \"cf1319c5-c836-4c8a-8002-1147cc1b3ed7\") " pod="calico-system/csi-node-driver-bw5cn" Dec 13 14:16:48.032558 kubelet[2977]: E1213 14:16:48.032511 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.032795 kubelet[2977]: W1213 14:16:48.032752 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.032972 kubelet[2977]: E1213 14:16:48.032943 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.033171 kubelet[2977]: I1213 14:16:48.033140 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/cf1319c5-c836-4c8a-8002-1147cc1b3ed7-varrun\") pod \"csi-node-driver-bw5cn\" (UID: \"cf1319c5-c836-4c8a-8002-1147cc1b3ed7\") " pod="calico-system/csi-node-driver-bw5cn" Dec 13 14:16:48.033804 kubelet[2977]: E1213 14:16:48.033762 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.034035 kubelet[2977]: W1213 14:16:48.034000 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.034628 kubelet[2977]: E1213 14:16:48.034591 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.034868 kubelet[2977]: W1213 14:16:48.034828 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.035045 kubelet[2977]: E1213 14:16:48.035012 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.035349 kubelet[2977]: E1213 14:16:48.035312 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.035540 kubelet[2977]: I1213 14:16:48.035509 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9szwf\" (UniqueName: \"kubernetes.io/projected/cf1319c5-c836-4c8a-8002-1147cc1b3ed7-kube-api-access-9szwf\") pod \"csi-node-driver-bw5cn\" (UID: \"cf1319c5-c836-4c8a-8002-1147cc1b3ed7\") " pod="calico-system/csi-node-driver-bw5cn" Dec 13 14:16:48.035778 kubelet[2977]: E1213 14:16:48.035733 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.035778 kubelet[2977]: W1213 14:16:48.035774 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.035966 kubelet[2977]: E1213 14:16:48.035821 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.036404 kubelet[2977]: E1213 14:16:48.036366 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.036404 kubelet[2977]: W1213 14:16:48.036400 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.036588 kubelet[2977]: E1213 14:16:48.036433 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.036000 audit[3395]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3395 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:48.038071 kubelet[2977]: E1213 14:16:48.038030 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.038216 kubelet[2977]: W1213 14:16:48.038068 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.038216 kubelet[2977]: E1213 14:16:48.038143 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.040051 kubelet[2977]: E1213 14:16:48.039808 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.040289 kubelet[2977]: W1213 14:16:48.040069 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.040361 kubelet[2977]: E1213 14:16:48.040329 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.040423 kubelet[2977]: I1213 14:16:48.040378 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/cf1319c5-c836-4c8a-8002-1147cc1b3ed7-kubelet-dir\") pod \"csi-node-driver-bw5cn\" (UID: \"cf1319c5-c836-4c8a-8002-1147cc1b3ed7\") " pod="calico-system/csi-node-driver-bw5cn" Dec 13 14:16:48.040960 kubelet[2977]: E1213 14:16:48.040893 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.040960 kubelet[2977]: W1213 14:16:48.040941 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.041280 kubelet[2977]: E1213 14:16:48.040978 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.044161 kubelet[2977]: E1213 14:16:48.042532 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.044161 kubelet[2977]: W1213 14:16:48.042571 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.044161 kubelet[2977]: E1213 14:16:48.042629 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.044161 kubelet[2977]: E1213 14:16:48.043071 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.044161 kubelet[2977]: W1213 14:16:48.043145 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.044161 kubelet[2977]: E1213 14:16:48.043178 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.046180 kubelet[2977]: E1213 14:16:48.044939 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.046180 kubelet[2977]: W1213 14:16:48.044977 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.046180 kubelet[2977]: E1213 14:16:48.045011 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.046180 kubelet[2977]: E1213 14:16:48.045506 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.046180 kubelet[2977]: W1213 14:16:48.045530 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.046180 kubelet[2977]: E1213 14:16:48.045558 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.046180 kubelet[2977]: I1213 14:16:48.045605 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/cf1319c5-c836-4c8a-8002-1147cc1b3ed7-registration-dir\") pod \"csi-node-driver-bw5cn\" (UID: \"cf1319c5-c836-4c8a-8002-1147cc1b3ed7\") " pod="calico-system/csi-node-driver-bw5cn" Dec 13 14:16:48.046180 kubelet[2977]: E1213 14:16:48.046025 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.046180 kubelet[2977]: W1213 14:16:48.046050 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.046772 kubelet[2977]: E1213 14:16:48.046174 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.046772 kubelet[2977]: E1213 14:16:48.046571 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.046772 kubelet[2977]: W1213 14:16:48.046590 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.046772 kubelet[2977]: E1213 14:16:48.046612 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.036000 audit[3395]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff02af750 a2=0 a3=1 items=0 ppid=3137 pid=3395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:48.036000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:48.090965 env[1814]: time="2024-12-13T14:16:48.090890995Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5t44d,Uid:6787c68b-d4b4-4106-bb10-cfc9cca0f03a,Namespace:calico-system,Attempt:0,}" Dec 13 14:16:48.123004 env[1814]: time="2024-12-13T14:16:48.122714390Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:16:48.123199 env[1814]: time="2024-12-13T14:16:48.123019589Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:16:48.123199 env[1814]: time="2024-12-13T14:16:48.123088277Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:16:48.123622 env[1814]: time="2024-12-13T14:16:48.123536925Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4da79145bc146636034a6514d5b0dd1cb2e1864d1cfc6d07bfd134680ecb55fa pid=3424 runtime=io.containerd.runc.v2 Dec 13 14:16:48.147153 kubelet[2977]: E1213 14:16:48.146999 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.147153 kubelet[2977]: W1213 14:16:48.147040 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.147153 kubelet[2977]: E1213 14:16:48.147073 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.148052 kubelet[2977]: E1213 14:16:48.147904 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.148052 kubelet[2977]: W1213 14:16:48.147931 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.148052 kubelet[2977]: E1213 14:16:48.147971 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.148553 kubelet[2977]: E1213 14:16:48.148506 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.148553 kubelet[2977]: W1213 14:16:48.148542 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.148737 kubelet[2977]: E1213 14:16:48.148587 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.153324 kubelet[2977]: E1213 14:16:48.153271 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.153324 kubelet[2977]: W1213 14:16:48.153313 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.153683 kubelet[2977]: E1213 14:16:48.153537 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.155418 kubelet[2977]: E1213 14:16:48.154089 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.155418 kubelet[2977]: W1213 14:16:48.154149 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.155418 kubelet[2977]: E1213 14:16:48.154337 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.157340 kubelet[2977]: E1213 14:16:48.157287 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.157340 kubelet[2977]: W1213 14:16:48.157326 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.157590 kubelet[2977]: E1213 14:16:48.157550 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.157932 kubelet[2977]: E1213 14:16:48.157897 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.157932 kubelet[2977]: W1213 14:16:48.157926 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.158299 kubelet[2977]: E1213 14:16:48.158134 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.158500 kubelet[2977]: E1213 14:16:48.158464 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.158500 kubelet[2977]: W1213 14:16:48.158493 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.158931 kubelet[2977]: E1213 14:16:48.158663 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.159044 kubelet[2977]: E1213 14:16:48.159008 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.159044 kubelet[2977]: W1213 14:16:48.159028 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.163017 kubelet[2977]: E1213 14:16:48.162951 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.163222 kubelet[2977]: E1213 14:16:48.163157 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.163222 kubelet[2977]: W1213 14:16:48.163180 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.163592 kubelet[2977]: E1213 14:16:48.163374 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.164016 kubelet[2977]: E1213 14:16:48.163960 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.164016 kubelet[2977]: W1213 14:16:48.164000 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.164509 kubelet[2977]: E1213 14:16:48.164285 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.164894 kubelet[2977]: E1213 14:16:48.164846 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.164894 kubelet[2977]: W1213 14:16:48.164880 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.165040 kubelet[2977]: E1213 14:16:48.164998 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.166234 kubelet[2977]: E1213 14:16:48.166169 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.166234 kubelet[2977]: W1213 14:16:48.166220 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.166480 kubelet[2977]: E1213 14:16:48.166352 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.167786 kubelet[2977]: E1213 14:16:48.167210 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.167786 kubelet[2977]: W1213 14:16:48.167251 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.167786 kubelet[2977]: E1213 14:16:48.167466 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.169270 kubelet[2977]: E1213 14:16:48.168967 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.169270 kubelet[2977]: W1213 14:16:48.169014 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.169270 kubelet[2977]: E1213 14:16:48.169201 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.169570 kubelet[2977]: E1213 14:16:48.169523 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.169570 kubelet[2977]: W1213 14:16:48.169561 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.170637 kubelet[2977]: E1213 14:16:48.169730 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.170797 kubelet[2977]: E1213 14:16:48.170716 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.170797 kubelet[2977]: W1213 14:16:48.170744 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.170956 kubelet[2977]: E1213 14:16:48.170935 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.172781 kubelet[2977]: E1213 14:16:48.171388 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.172781 kubelet[2977]: W1213 14:16:48.171422 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.172781 kubelet[2977]: E1213 14:16:48.171677 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.174161 kubelet[2977]: E1213 14:16:48.173329 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.174161 kubelet[2977]: W1213 14:16:48.173365 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.174161 kubelet[2977]: E1213 14:16:48.173602 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.174161 kubelet[2977]: E1213 14:16:48.173996 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.174161 kubelet[2977]: W1213 14:16:48.174019 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.174576 kubelet[2977]: E1213 14:16:48.174219 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.180180 kubelet[2977]: E1213 14:16:48.177329 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.180180 kubelet[2977]: W1213 14:16:48.177367 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.180180 kubelet[2977]: E1213 14:16:48.177801 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.180180 kubelet[2977]: W1213 14:16:48.177822 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.180180 kubelet[2977]: E1213 14:16:48.179321 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.180180 kubelet[2977]: E1213 14:16:48.179429 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.189137 kubelet[2977]: E1213 14:16:48.188670 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.189137 kubelet[2977]: W1213 14:16:48.188716 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.189137 kubelet[2977]: E1213 14:16:48.188761 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.190148 systemd[1]: Started cri-containerd-4da79145bc146636034a6514d5b0dd1cb2e1864d1cfc6d07bfd134680ecb55fa.scope. Dec 13 14:16:48.191747 kubelet[2977]: E1213 14:16:48.191482 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.191747 kubelet[2977]: W1213 14:16:48.191512 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.191747 kubelet[2977]: E1213 14:16:48.191748 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.192376 kubelet[2977]: E1213 14:16:48.192258 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.192376 kubelet[2977]: W1213 14:16:48.192287 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.192376 kubelet[2977]: E1213 14:16:48.192318 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.208889 kubelet[2977]: E1213 14:16:48.208853 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:48.209114 kubelet[2977]: W1213 14:16:48.209065 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:48.209257 kubelet[2977]: E1213 14:16:48.209230 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:48.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.252000 audit: BPF prog-id=122 op=LOAD Dec 13 14:16:48.262000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.262000 audit[3432]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3424 pid=3432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:48.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464613739313435626331343636333630333461363531346435623064 Dec 13 14:16:48.262000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.262000 audit[3432]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3424 pid=3432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:48.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464613739313435626331343636333630333461363531346435623064 Dec 13 14:16:48.263000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.263000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.263000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.263000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.263000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.263000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.263000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.263000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.263000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.263000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.263000 audit: BPF prog-id=123 op=LOAD Dec 13 14:16:48.263000 audit[3432]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3424 pid=3432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:48.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464613739313435626331343636333630333461363531346435623064 Dec 13 14:16:48.265000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.265000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.265000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.265000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.265000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.265000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.265000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.265000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.265000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.265000 audit: BPF prog-id=124 op=LOAD Dec 13 14:16:48.265000 audit[3432]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3424 pid=3432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:48.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464613739313435626331343636333630333461363531346435623064 Dec 13 14:16:48.266000 audit: BPF prog-id=124 op=UNLOAD Dec 13 14:16:48.266000 audit: BPF prog-id=123 op=UNLOAD Dec 13 14:16:48.267000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.267000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.267000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.267000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.267000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.267000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.267000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.267000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.267000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.267000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:48.267000 audit: BPF prog-id=125 op=LOAD Dec 13 14:16:48.267000 audit[3432]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3424 pid=3432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:48.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464613739313435626331343636333630333461363531346435623064 Dec 13 14:16:48.270354 env[1814]: time="2024-12-13T14:16:48.270274833Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-68dbf58468-28pzv,Uid:d98e1a52-e388-412d-ad70-96ca8c69020f,Namespace:calico-system,Attempt:0,} returns sandbox id \"54fcf6b892cb5e84a352f829855ae389ce2940cbe72ff14759814a18731592a4\"" Dec 13 14:16:48.274697 env[1814]: time="2024-12-13T14:16:48.274604562Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 14:16:48.311648 env[1814]: time="2024-12-13T14:16:48.311591058Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5t44d,Uid:6787c68b-d4b4-4106-bb10-cfc9cca0f03a,Namespace:calico-system,Attempt:0,} returns sandbox id \"4da79145bc146636034a6514d5b0dd1cb2e1864d1cfc6d07bfd134680ecb55fa\"" Dec 13 14:16:48.623684 systemd[1]: run-containerd-runc-k8s.io-54fcf6b892cb5e84a352f829855ae389ce2940cbe72ff14759814a18731592a4-runc.cIrccR.mount: Deactivated successfully. Dec 13 14:16:49.653130 kubelet[2977]: E1213 14:16:49.651034 2977 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bw5cn" podUID="cf1319c5-c836-4c8a-8002-1147cc1b3ed7" Dec 13 14:16:49.797543 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2743700922.mount: Deactivated successfully. Dec 13 14:16:50.867247 env[1814]: time="2024-12-13T14:16:50.867177615Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:50.869531 env[1814]: time="2024-12-13T14:16:50.869465275Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1d1fc316829ae1650b0b1629b54232520f297e7c3b1444eecd290ae088902a28,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:50.872173 env[1814]: time="2024-12-13T14:16:50.872078522Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:50.874631 env[1814]: time="2024-12-13T14:16:50.874568613Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:50.875798 env[1814]: time="2024-12-13T14:16:50.875750033Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:1d1fc316829ae1650b0b1629b54232520f297e7c3b1444eecd290ae088902a28\"" Dec 13 14:16:50.893274 env[1814]: time="2024-12-13T14:16:50.893222136Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:16:50.910267 env[1814]: time="2024-12-13T14:16:50.910204647Z" level=info msg="CreateContainer within sandbox \"54fcf6b892cb5e84a352f829855ae389ce2940cbe72ff14759814a18731592a4\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 14:16:50.931196 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3439461306.mount: Deactivated successfully. Dec 13 14:16:50.940072 env[1814]: time="2024-12-13T14:16:50.939984868Z" level=info msg="CreateContainer within sandbox \"54fcf6b892cb5e84a352f829855ae389ce2940cbe72ff14759814a18731592a4\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"da516778c82ca2cd325c758f6bc3367fd39d6c2501f7cab1dd02a719b4438f18\"" Dec 13 14:16:50.942362 env[1814]: time="2024-12-13T14:16:50.942310545Z" level=info msg="StartContainer for \"da516778c82ca2cd325c758f6bc3367fd39d6c2501f7cab1dd02a719b4438f18\"" Dec 13 14:16:50.995681 systemd[1]: Started cri-containerd-da516778c82ca2cd325c758f6bc3367fd39d6c2501f7cab1dd02a719b4438f18.scope. Dec 13 14:16:51.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.040000 audit: BPF prog-id=126 op=LOAD Dec 13 14:16:51.041000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.041000 audit[3497]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3351 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:51.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461353136373738633832636132636433323563373538663662633333 Dec 13 14:16:51.042000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.042000 audit[3497]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3351 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:51.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461353136373738633832636132636433323563373538663662633333 Dec 13 14:16:51.042000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.042000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.042000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.042000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.042000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.042000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.042000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.042000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.042000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.042000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.042000 audit: BPF prog-id=127 op=LOAD Dec 13 14:16:51.042000 audit[3497]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3351 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:51.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461353136373738633832636132636433323563373538663662633333 Dec 13 14:16:51.042000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.042000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.042000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.042000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.042000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.042000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.042000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.042000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.042000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.042000 audit: BPF prog-id=128 op=LOAD Dec 13 14:16:51.042000 audit[3497]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3351 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:51.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461353136373738633832636132636433323563373538663662633333 Dec 13 14:16:51.042000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:16:51.042000 audit: BPF prog-id=127 op=UNLOAD Dec 13 14:16:51.043000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.043000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.043000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.043000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.043000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.043000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.043000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.043000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.043000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.043000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:51.043000 audit: BPF prog-id=129 op=LOAD Dec 13 14:16:51.043000 audit[3497]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3351 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:51.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461353136373738633832636132636433323563373538663662633333 Dec 13 14:16:51.093134 env[1814]: time="2024-12-13T14:16:51.092707616Z" level=info msg="StartContainer for \"da516778c82ca2cd325c758f6bc3367fd39d6c2501f7cab1dd02a719b4438f18\" returns successfully" Dec 13 14:16:51.650940 kubelet[2977]: E1213 14:16:51.650480 2977 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bw5cn" podUID="cf1319c5-c836-4c8a-8002-1147cc1b3ed7" Dec 13 14:16:51.768946 kubelet[2977]: E1213 14:16:51.768905 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.769164 kubelet[2977]: W1213 14:16:51.769133 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.769292 kubelet[2977]: E1213 14:16:51.769266 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.769979 kubelet[2977]: E1213 14:16:51.769950 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.770153 kubelet[2977]: W1213 14:16:51.770126 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.770298 kubelet[2977]: E1213 14:16:51.770273 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.770808 kubelet[2977]: E1213 14:16:51.770784 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.770957 kubelet[2977]: W1213 14:16:51.770928 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.771109 kubelet[2977]: E1213 14:16:51.771067 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.772787 kubelet[2977]: E1213 14:16:51.772754 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.772991 kubelet[2977]: W1213 14:16:51.772963 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.773180 kubelet[2977]: E1213 14:16:51.773090 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.774011 kubelet[2977]: E1213 14:16:51.773983 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.774189 kubelet[2977]: W1213 14:16:51.774161 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.774342 kubelet[2977]: E1213 14:16:51.774313 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.776523 kubelet[2977]: E1213 14:16:51.776490 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.776730 kubelet[2977]: W1213 14:16:51.776699 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.776892 kubelet[2977]: E1213 14:16:51.776866 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.777437 kubelet[2977]: E1213 14:16:51.777395 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.777609 kubelet[2977]: W1213 14:16:51.777579 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.777769 kubelet[2977]: E1213 14:16:51.777737 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.778493 kubelet[2977]: E1213 14:16:51.778461 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.778706 kubelet[2977]: W1213 14:16:51.778662 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.778851 kubelet[2977]: E1213 14:16:51.778821 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.779588 kubelet[2977]: E1213 14:16:51.779549 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.779588 kubelet[2977]: W1213 14:16:51.779586 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.779775 kubelet[2977]: E1213 14:16:51.779617 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.780195 kubelet[2977]: E1213 14:16:51.780149 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.780195 kubelet[2977]: W1213 14:16:51.780191 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.780356 kubelet[2977]: E1213 14:16:51.780221 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.780681 kubelet[2977]: E1213 14:16:51.780653 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.780763 kubelet[2977]: W1213 14:16:51.780681 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.780763 kubelet[2977]: E1213 14:16:51.780707 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.781161 kubelet[2977]: E1213 14:16:51.781131 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.781243 kubelet[2977]: W1213 14:16:51.781160 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.781243 kubelet[2977]: E1213 14:16:51.781203 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.782254 kubelet[2977]: E1213 14:16:51.782222 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.782479 kubelet[2977]: W1213 14:16:51.782449 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.782621 kubelet[2977]: E1213 14:16:51.782595 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.783199 kubelet[2977]: E1213 14:16:51.783089 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.783385 kubelet[2977]: W1213 14:16:51.783358 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.783510 kubelet[2977]: E1213 14:16:51.783483 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.783964 kubelet[2977]: E1213 14:16:51.783941 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.784142 kubelet[2977]: W1213 14:16:51.784073 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.784309 kubelet[2977]: E1213 14:16:51.784281 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.790682 kubelet[2977]: E1213 14:16:51.790644 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.790909 kubelet[2977]: W1213 14:16:51.790863 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.793943 kubelet[2977]: E1213 14:16:51.791562 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.794950 kubelet[2977]: I1213 14:16:51.793862 2977 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-68dbf58468-28pzv" podStartSLOduration=2.189687397 podStartE2EDuration="4.793841674s" podCreationTimestamp="2024-12-13 14:16:47 +0000 UTC" firstStartedPulling="2024-12-13 14:16:48.273814608 +0000 UTC m=+14.941323225" lastFinishedPulling="2024-12-13 14:16:50.877968873 +0000 UTC m=+17.545477502" observedRunningTime="2024-12-13 14:16:51.793568444 +0000 UTC m=+18.461077109" watchObservedRunningTime="2024-12-13 14:16:51.793841674 +0000 UTC m=+18.461350315" Dec 13 14:16:51.795589 kubelet[2977]: E1213 14:16:51.795555 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.795851 kubelet[2977]: W1213 14:16:51.795815 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.796183 kubelet[2977]: E1213 14:16:51.796050 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.796936 kubelet[2977]: E1213 14:16:51.796901 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.797180 kubelet[2977]: W1213 14:16:51.797138 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.797357 kubelet[2977]: E1213 14:16:51.797330 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.798054 kubelet[2977]: E1213 14:16:51.798026 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.798262 kubelet[2977]: W1213 14:16:51.798233 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.798430 kubelet[2977]: E1213 14:16:51.798403 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.799187 kubelet[2977]: E1213 14:16:51.799073 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.799386 kubelet[2977]: W1213 14:16:51.799355 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.799546 kubelet[2977]: E1213 14:16:51.799521 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.800351 kubelet[2977]: E1213 14:16:51.800317 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.800572 kubelet[2977]: W1213 14:16:51.800538 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.800773 kubelet[2977]: E1213 14:16:51.800745 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.801577 kubelet[2977]: E1213 14:16:51.801547 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.801788 kubelet[2977]: W1213 14:16:51.801759 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.801953 kubelet[2977]: E1213 14:16:51.801926 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.802987 kubelet[2977]: E1213 14:16:51.802951 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.803269 kubelet[2977]: W1213 14:16:51.803235 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.803467 kubelet[2977]: E1213 14:16:51.803426 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.803963 kubelet[2977]: E1213 14:16:51.803924 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.803963 kubelet[2977]: W1213 14:16:51.803961 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.804242 kubelet[2977]: E1213 14:16:51.804008 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.804479 kubelet[2977]: E1213 14:16:51.804447 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.804479 kubelet[2977]: W1213 14:16:51.804479 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.804680 kubelet[2977]: E1213 14:16:51.804643 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.805248 kubelet[2977]: E1213 14:16:51.805208 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.805248 kubelet[2977]: W1213 14:16:51.805235 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.805474 kubelet[2977]: E1213 14:16:51.805444 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.805634 kubelet[2977]: E1213 14:16:51.805556 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.805783 kubelet[2977]: W1213 14:16:51.805757 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.805953 kubelet[2977]: E1213 14:16:51.805913 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.806498 kubelet[2977]: E1213 14:16:51.806465 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.806685 kubelet[2977]: W1213 14:16:51.806658 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.806846 kubelet[2977]: E1213 14:16:51.806819 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.807270 kubelet[2977]: E1213 14:16:51.807240 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.807270 kubelet[2977]: W1213 14:16:51.807269 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.807434 kubelet[2977]: E1213 14:16:51.807302 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.807713 kubelet[2977]: E1213 14:16:51.807683 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.807814 kubelet[2977]: W1213 14:16:51.807711 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.807933 kubelet[2977]: E1213 14:16:51.807906 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.808192 kubelet[2977]: E1213 14:16:51.808010 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.808192 kubelet[2977]: W1213 14:16:51.808185 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.808326 kubelet[2977]: E1213 14:16:51.808210 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.809172 kubelet[2977]: E1213 14:16:51.809137 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.809354 kubelet[2977]: W1213 14:16:51.809328 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.809509 kubelet[2977]: E1213 14:16:51.809483 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:51.809886 kubelet[2977]: E1213 14:16:51.809855 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:51.810034 kubelet[2977]: W1213 14:16:51.809885 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:51.810034 kubelet[2977]: E1213 14:16:51.809910 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:52.486395 env[1814]: time="2024-12-13T14:16:52.486337319Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:52.491736 env[1814]: time="2024-12-13T14:16:52.491681495Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:52.500258 env[1814]: time="2024-12-13T14:16:52.500204577Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:52.507045 env[1814]: time="2024-12-13T14:16:52.506993132Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:52.508604 env[1814]: time="2024-12-13T14:16:52.508545294Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348\"" Dec 13 14:16:52.515282 env[1814]: time="2024-12-13T14:16:52.515224576Z" level=info msg="CreateContainer within sandbox \"4da79145bc146636034a6514d5b0dd1cb2e1864d1cfc6d07bfd134680ecb55fa\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:16:52.543247 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount229577199.mount: Deactivated successfully. Dec 13 14:16:52.548916 env[1814]: time="2024-12-13T14:16:52.548821301Z" level=info msg="CreateContainer within sandbox \"4da79145bc146636034a6514d5b0dd1cb2e1864d1cfc6d07bfd134680ecb55fa\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"a5c28393ede7e96761e76286854fdc581cd32427a4503b0f0ca5067eedbe6005\"" Dec 13 14:16:52.553387 env[1814]: time="2024-12-13T14:16:52.551646816Z" level=info msg="StartContainer for \"a5c28393ede7e96761e76286854fdc581cd32427a4503b0f0ca5067eedbe6005\"" Dec 13 14:16:52.606013 systemd[1]: Started cri-containerd-a5c28393ede7e96761e76286854fdc581cd32427a4503b0f0ca5067eedbe6005.scope. Dec 13 14:16:52.662000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.665646 kernel: kauditd_printk_skb: 179 callbacks suppressed Dec 13 14:16:52.665797 kernel: audit: type=1400 audit(1734099412.662:965): avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.662000 audit[3566]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3424 pid=3566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:52.683667 kernel: audit: type=1300 audit(1734099412.662:965): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3424 pid=3566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:52.683808 kernel: audit: type=1327 audit(1734099412.662:965): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135633238333933656465376539363736316537363238363835346664 Dec 13 14:16:52.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135633238333933656465376539363736316537363238363835346664 Dec 13 14:16:52.695147 kernel: audit: type=1400 audit(1734099412.662:966): avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.662000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.662000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.707446 kernel: audit: type=1400 audit(1734099412.662:966): avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.662000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.662000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.722133 kernel: audit: type=1400 audit(1734099412.662:966): avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.722287 kernel: audit: type=1400 audit(1734099412.662:966): avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.662000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.731072 kernel: audit: type=1400 audit(1734099412.662:966): avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.662000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.741455 kernel: audit: type=1400 audit(1734099412.662:966): avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.662000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.755060 kernel: audit: type=1400 audit(1734099412.662:966): avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.662000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.662000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.662000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.662000 audit: BPF prog-id=130 op=LOAD Dec 13 14:16:52.662000 audit[3566]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3424 pid=3566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:52.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135633238333933656465376539363736316537363238363835346664 Dec 13 14:16:52.664000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.664000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.664000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.664000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.664000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.664000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.664000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.664000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.664000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.664000 audit: BPF prog-id=131 op=LOAD Dec 13 14:16:52.664000 audit[3566]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3424 pid=3566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:52.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135633238333933656465376539363736316537363238363835346664 Dec 13 14:16:52.672000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:16:52.672000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:16:52.672000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.672000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.672000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.672000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.672000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.672000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.672000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.672000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.672000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.672000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:52.672000 audit: BPF prog-id=132 op=LOAD Dec 13 14:16:52.672000 audit[3566]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3424 pid=3566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:52.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135633238333933656465376539363736316537363238363835346664 Dec 13 14:16:52.772651 kubelet[2977]: I1213 14:16:52.772584 2977 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:16:52.775948 env[1814]: time="2024-12-13T14:16:52.775880010Z" level=info msg="StartContainer for \"a5c28393ede7e96761e76286854fdc581cd32427a4503b0f0ca5067eedbe6005\" returns successfully" Dec 13 14:16:52.791387 kubelet[2977]: E1213 14:16:52.791348 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:52.791634 kubelet[2977]: W1213 14:16:52.791603 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:52.791802 kubelet[2977]: E1213 14:16:52.791772 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:52.792687 kubelet[2977]: E1213 14:16:52.792649 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:52.792923 kubelet[2977]: W1213 14:16:52.792891 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:52.793088 kubelet[2977]: E1213 14:16:52.793060 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:52.795024 kubelet[2977]: E1213 14:16:52.794983 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:52.795287 kubelet[2977]: W1213 14:16:52.795254 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:52.795451 kubelet[2977]: E1213 14:16:52.795421 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:52.796219 kubelet[2977]: E1213 14:16:52.796181 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:52.796465 kubelet[2977]: W1213 14:16:52.796431 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:52.796663 kubelet[2977]: E1213 14:16:52.796633 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:52.797450 kubelet[2977]: E1213 14:16:52.797417 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:52.797644 kubelet[2977]: W1213 14:16:52.797614 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:52.797823 kubelet[2977]: E1213 14:16:52.797791 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:52.799421 kubelet[2977]: E1213 14:16:52.799364 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:52.799730 kubelet[2977]: W1213 14:16:52.799675 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:52.799907 kubelet[2977]: E1213 14:16:52.799877 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:52.800899 kubelet[2977]: E1213 14:16:52.800853 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:52.801185 kubelet[2977]: W1213 14:16:52.801146 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:52.801355 kubelet[2977]: E1213 14:16:52.801322 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:52.802015 kubelet[2977]: E1213 14:16:52.801977 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:52.802341 kubelet[2977]: W1213 14:16:52.802299 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:52.802593 kubelet[2977]: E1213 14:16:52.802555 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:52.803948 kubelet[2977]: E1213 14:16:52.803907 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:52.804304 kubelet[2977]: W1213 14:16:52.804256 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:52.804511 kubelet[2977]: E1213 14:16:52.804476 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:52.809302 kubelet[2977]: E1213 14:16:52.809263 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:52.809609 kubelet[2977]: W1213 14:16:52.809576 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:52.809767 kubelet[2977]: E1213 14:16:52.809738 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:52.812280 kubelet[2977]: E1213 14:16:52.812242 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:52.812495 kubelet[2977]: W1213 14:16:52.812463 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:52.812625 kubelet[2977]: E1213 14:16:52.812599 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:52.813878 kubelet[2977]: E1213 14:16:52.813841 2977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:16:52.814131 kubelet[2977]: W1213 14:16:52.814080 2977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:16:52.814282 kubelet[2977]: E1213 14:16:52.814256 2977 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:16:52.818920 systemd[1]: cri-containerd-a5c28393ede7e96761e76286854fdc581cd32427a4503b0f0ca5067eedbe6005.scope: Deactivated successfully. Dec 13 14:16:52.824000 audit: BPF prog-id=132 op=UNLOAD Dec 13 14:16:52.888214 systemd[1]: run-containerd-runc-k8s.io-a5c28393ede7e96761e76286854fdc581cd32427a4503b0f0ca5067eedbe6005-runc.wIBNyK.mount: Deactivated successfully. Dec 13 14:16:52.888426 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a5c28393ede7e96761e76286854fdc581cd32427a4503b0f0ca5067eedbe6005-rootfs.mount: Deactivated successfully. Dec 13 14:16:53.138356 env[1814]: time="2024-12-13T14:16:53.138294911Z" level=info msg="shim disconnected" id=a5c28393ede7e96761e76286854fdc581cd32427a4503b0f0ca5067eedbe6005 Dec 13 14:16:53.138790 env[1814]: time="2024-12-13T14:16:53.138757706Z" level=warning msg="cleaning up after shim disconnected" id=a5c28393ede7e96761e76286854fdc581cd32427a4503b0f0ca5067eedbe6005 namespace=k8s.io Dec 13 14:16:53.138936 env[1814]: time="2024-12-13T14:16:53.138908919Z" level=info msg="cleaning up dead shim" Dec 13 14:16:53.153501 env[1814]: time="2024-12-13T14:16:53.153442059Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:16:53Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3624 runtime=io.containerd.runc.v2\n" Dec 13 14:16:53.651064 kubelet[2977]: E1213 14:16:53.651010 2977 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bw5cn" podUID="cf1319c5-c836-4c8a-8002-1147cc1b3ed7" Dec 13 14:16:53.782183 env[1814]: time="2024-12-13T14:16:53.781692683Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:16:55.651501 kubelet[2977]: E1213 14:16:55.651444 2977 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bw5cn" podUID="cf1319c5-c836-4c8a-8002-1147cc1b3ed7" Dec 13 14:16:57.538679 kubelet[2977]: I1213 14:16:57.538621 2977 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:16:57.639000 audit[3639]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3639 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:57.639000 audit[3639]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffce4cacb0 a2=0 a3=1 items=0 ppid=3137 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:57.639000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:57.646000 audit[3639]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3639 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:57.646000 audit[3639]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffce4cacb0 a2=0 a3=1 items=0 ppid=3137 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:57.646000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:57.655194 kubelet[2977]: E1213 14:16:57.654271 2977 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bw5cn" podUID="cf1319c5-c836-4c8a-8002-1147cc1b3ed7" Dec 13 14:16:59.255372 env[1814]: time="2024-12-13T14:16:59.255299065Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:59.257884 env[1814]: time="2024-12-13T14:16:59.257817327Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:59.260647 env[1814]: time="2024-12-13T14:16:59.260591647Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:59.262993 env[1814]: time="2024-12-13T14:16:59.262939472Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:16:59.264261 env[1814]: time="2024-12-13T14:16:59.264212571Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f\"" Dec 13 14:16:59.271790 env[1814]: time="2024-12-13T14:16:59.271730326Z" level=info msg="CreateContainer within sandbox \"4da79145bc146636034a6514d5b0dd1cb2e1864d1cfc6d07bfd134680ecb55fa\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:16:59.295776 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2782940638.mount: Deactivated successfully. Dec 13 14:16:59.306380 env[1814]: time="2024-12-13T14:16:59.306292981Z" level=info msg="CreateContainer within sandbox \"4da79145bc146636034a6514d5b0dd1cb2e1864d1cfc6d07bfd134680ecb55fa\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"d79025a9fee1970d68794395ed54c82b68c38a6cdc8f33542ada01c51c5bc26c\"" Dec 13 14:16:59.309134 env[1814]: time="2024-12-13T14:16:59.307678629Z" level=info msg="StartContainer for \"d79025a9fee1970d68794395ed54c82b68c38a6cdc8f33542ada01c51c5bc26c\"" Dec 13 14:16:59.366219 systemd[1]: run-containerd-runc-k8s.io-d79025a9fee1970d68794395ed54c82b68c38a6cdc8f33542ada01c51c5bc26c-runc.tMiyyt.mount: Deactivated successfully. Dec 13 14:16:59.374504 systemd[1]: Started cri-containerd-d79025a9fee1970d68794395ed54c82b68c38a6cdc8f33542ada01c51c5bc26c.scope. Dec 13 14:16:59.408000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.411710 kernel: kauditd_printk_skb: 40 callbacks suppressed Dec 13 14:16:59.411823 kernel: audit: type=1400 audit(1734099419.408:974): avc: denied { perfmon } for pid=3648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.408000 audit[3648]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3424 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:59.428949 kernel: audit: type=1300 audit(1734099419.408:974): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3424 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:59.429345 kernel: audit: type=1327 audit(1734099419.408:974): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437393032356139666565313937306436383739343339356564353463 Dec 13 14:16:59.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437393032356139666565313937306436383739343339356564353463 Dec 13 14:16:59.408000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.446672 kernel: audit: type=1400 audit(1734099419.408:975): avc: denied { bpf } for pid=3648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.408000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.454502 kernel: audit: type=1400 audit(1734099419.408:975): avc: denied { bpf } for pid=3648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.408000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.463091 kernel: audit: type=1400 audit(1734099419.408:975): avc: denied { bpf } for pid=3648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.408000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.470830 kernel: audit: type=1400 audit(1734099419.408:975): avc: denied { perfmon } for pid=3648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.408000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.478381 kernel: audit: type=1400 audit(1734099419.408:975): avc: denied { perfmon } for pid=3648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.408000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.408000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.493874 kernel: audit: type=1400 audit(1734099419.408:975): avc: denied { perfmon } for pid=3648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.494035 kernel: audit: type=1400 audit(1734099419.408:975): avc: denied { perfmon } for pid=3648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.408000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.408000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.408000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.408000 audit: BPF prog-id=133 op=LOAD Dec 13 14:16:59.408000 audit[3648]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3424 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:59.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437393032356139666565313937306436383739343339356564353463 Dec 13 14:16:59.410000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.410000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.410000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.410000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.410000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.410000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.410000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.410000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.410000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.410000 audit: BPF prog-id=134 op=LOAD Dec 13 14:16:59.410000 audit[3648]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3424 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:59.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437393032356139666565313937306436383739343339356564353463 Dec 13 14:16:59.417000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:16:59.417000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:16:59.417000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.417000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.417000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.417000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.417000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.417000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.417000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.417000 audit[3648]: AVC avc: denied { perfmon } for pid=3648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.417000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.417000 audit[3648]: AVC avc: denied { bpf } for pid=3648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:16:59.417000 audit: BPF prog-id=135 op=LOAD Dec 13 14:16:59.417000 audit[3648]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3424 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:59.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437393032356139666565313937306436383739343339356564353463 Dec 13 14:16:59.498416 env[1814]: time="2024-12-13T14:16:59.497418134Z" level=info msg="StartContainer for \"d79025a9fee1970d68794395ed54c82b68c38a6cdc8f33542ada01c51c5bc26c\" returns successfully" Dec 13 14:16:59.651534 kubelet[2977]: E1213 14:16:59.650737 2977 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bw5cn" podUID="cf1319c5-c836-4c8a-8002-1147cc1b3ed7" Dec 13 14:17:00.692936 env[1814]: time="2024-12-13T14:17:00.692737400Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:17:00.697354 systemd[1]: cri-containerd-d79025a9fee1970d68794395ed54c82b68c38a6cdc8f33542ada01c51c5bc26c.scope: Deactivated successfully. Dec 13 14:17:00.697860 systemd[1]: cri-containerd-d79025a9fee1970d68794395ed54c82b68c38a6cdc8f33542ada01c51c5bc26c.scope: Consumed 1.084s CPU time. Dec 13 14:17:00.700000 audit: BPF prog-id=135 op=UNLOAD Dec 13 14:17:00.743268 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d79025a9fee1970d68794395ed54c82b68c38a6cdc8f33542ada01c51c5bc26c-rootfs.mount: Deactivated successfully. Dec 13 14:17:00.758645 kubelet[2977]: I1213 14:17:00.757271 2977 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Dec 13 14:17:00.850323 systemd[1]: Created slice kubepods-burstable-poda1601850_1168_45e1_aa6f_035031c5398b.slice. Dec 13 14:17:00.876298 systemd[1]: Created slice kubepods-besteffort-poddcf6065a_3a3d_4bb0_8d44_1814af22309d.slice. Dec 13 14:17:00.934140 systemd[1]: Created slice kubepods-burstable-pod6133c088_e43c_4c97_acbe_a9a4e6ca0a6d.slice. Dec 13 14:17:00.952910 systemd[1]: Created slice kubepods-besteffort-pod8e9f081f_99e6_45b4_9e95_e66a885398fb.slice. Dec 13 14:17:00.981221 systemd[1]: Created slice kubepods-besteffort-pod88fddb2e_ae6a_4869_a25b_6bff4dd7b4da.slice. Dec 13 14:17:00.994739 kubelet[2977]: I1213 14:17:00.993697 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-59vg9\" (UniqueName: \"kubernetes.io/projected/dcf6065a-3a3d-4bb0-8d44-1814af22309d-kube-api-access-59vg9\") pod \"calico-apiserver-67c8d7c486-twvr5\" (UID: \"dcf6065a-3a3d-4bb0-8d44-1814af22309d\") " pod="calico-apiserver/calico-apiserver-67c8d7c486-twvr5" Dec 13 14:17:00.994739 kubelet[2977]: I1213 14:17:00.993785 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8e9f081f-99e6-45b4-9e95-e66a885398fb-tigera-ca-bundle\") pod \"calico-kube-controllers-6947bb669-zq9km\" (UID: \"8e9f081f-99e6-45b4-9e95-e66a885398fb\") " pod="calico-system/calico-kube-controllers-6947bb669-zq9km" Dec 13 14:17:00.994739 kubelet[2977]: I1213 14:17:00.993838 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fbx9m\" (UniqueName: \"kubernetes.io/projected/a1601850-1168-45e1-aa6f-035031c5398b-kube-api-access-fbx9m\") pod \"coredns-6f6b679f8f-c65g5\" (UID: \"a1601850-1168-45e1-aa6f-035031c5398b\") " pod="kube-system/coredns-6f6b679f8f-c65g5" Dec 13 14:17:00.994739 kubelet[2977]: I1213 14:17:00.993950 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/a1601850-1168-45e1-aa6f-035031c5398b-config-volume\") pod \"coredns-6f6b679f8f-c65g5\" (UID: \"a1601850-1168-45e1-aa6f-035031c5398b\") " pod="kube-system/coredns-6f6b679f8f-c65g5" Dec 13 14:17:00.994739 kubelet[2977]: I1213 14:17:00.993994 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/dcf6065a-3a3d-4bb0-8d44-1814af22309d-calico-apiserver-certs\") pod \"calico-apiserver-67c8d7c486-twvr5\" (UID: \"dcf6065a-3a3d-4bb0-8d44-1814af22309d\") " pod="calico-apiserver/calico-apiserver-67c8d7c486-twvr5" Dec 13 14:17:00.997397 kubelet[2977]: I1213 14:17:00.994032 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xtvq2\" (UniqueName: \"kubernetes.io/projected/8e9f081f-99e6-45b4-9e95-e66a885398fb-kube-api-access-xtvq2\") pod \"calico-kube-controllers-6947bb669-zq9km\" (UID: \"8e9f081f-99e6-45b4-9e95-e66a885398fb\") " pod="calico-system/calico-kube-controllers-6947bb669-zq9km" Dec 13 14:17:00.997397 kubelet[2977]: I1213 14:17:00.994079 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/6133c088-e43c-4c97-acbe-a9a4e6ca0a6d-config-volume\") pod \"coredns-6f6b679f8f-4bslf\" (UID: \"6133c088-e43c-4c97-acbe-a9a4e6ca0a6d\") " pod="kube-system/coredns-6f6b679f8f-4bslf" Dec 13 14:17:00.997397 kubelet[2977]: I1213 14:17:00.994155 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hnp24\" (UniqueName: \"kubernetes.io/projected/6133c088-e43c-4c97-acbe-a9a4e6ca0a6d-kube-api-access-hnp24\") pod \"coredns-6f6b679f8f-4bslf\" (UID: \"6133c088-e43c-4c97-acbe-a9a4e6ca0a6d\") " pod="kube-system/coredns-6f6b679f8f-4bslf" Dec 13 14:17:01.096556 kubelet[2977]: I1213 14:17:01.095454 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/88fddb2e-ae6a-4869-a25b-6bff4dd7b4da-calico-apiserver-certs\") pod \"calico-apiserver-67c8d7c486-ncfff\" (UID: \"88fddb2e-ae6a-4869-a25b-6bff4dd7b4da\") " pod="calico-apiserver/calico-apiserver-67c8d7c486-ncfff" Dec 13 14:17:01.096556 kubelet[2977]: I1213 14:17:01.095548 2977 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zmk8b\" (UniqueName: \"kubernetes.io/projected/88fddb2e-ae6a-4869-a25b-6bff4dd7b4da-kube-api-access-zmk8b\") pod \"calico-apiserver-67c8d7c486-ncfff\" (UID: \"88fddb2e-ae6a-4869-a25b-6bff4dd7b4da\") " pod="calico-apiserver/calico-apiserver-67c8d7c486-ncfff" Dec 13 14:17:01.173983 env[1814]: time="2024-12-13T14:17:01.173911215Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-c65g5,Uid:a1601850-1168-45e1-aa6f-035031c5398b,Namespace:kube-system,Attempt:0,}" Dec 13 14:17:01.211799 env[1814]: time="2024-12-13T14:17:01.211654695Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67c8d7c486-twvr5,Uid:dcf6065a-3a3d-4bb0-8d44-1814af22309d,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:17:01.247808 env[1814]: time="2024-12-13T14:17:01.247401616Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-4bslf,Uid:6133c088-e43c-4c97-acbe-a9a4e6ca0a6d,Namespace:kube-system,Attempt:0,}" Dec 13 14:17:01.276743 env[1814]: time="2024-12-13T14:17:01.276421061Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6947bb669-zq9km,Uid:8e9f081f-99e6-45b4-9e95-e66a885398fb,Namespace:calico-system,Attempt:0,}" Dec 13 14:17:01.295478 env[1814]: time="2024-12-13T14:17:01.295394436Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67c8d7c486-ncfff,Uid:88fddb2e-ae6a-4869-a25b-6bff4dd7b4da,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:17:01.412945 env[1814]: time="2024-12-13T14:17:01.412872659Z" level=info msg="shim disconnected" id=d79025a9fee1970d68794395ed54c82b68c38a6cdc8f33542ada01c51c5bc26c Dec 13 14:17:01.413242 env[1814]: time="2024-12-13T14:17:01.413182752Z" level=warning msg="cleaning up after shim disconnected" id=d79025a9fee1970d68794395ed54c82b68c38a6cdc8f33542ada01c51c5bc26c namespace=k8s.io Dec 13 14:17:01.413395 env[1814]: time="2024-12-13T14:17:01.413366425Z" level=info msg="cleaning up dead shim" Dec 13 14:17:01.430703 env[1814]: time="2024-12-13T14:17:01.430648931Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:17:01Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3695 runtime=io.containerd.runc.v2\n" Dec 13 14:17:01.664228 systemd[1]: Created slice kubepods-besteffort-podcf1319c5_c836_4c8a_8002_1147cc1b3ed7.slice. Dec 13 14:17:01.670032 env[1814]: time="2024-12-13T14:17:01.669945765Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bw5cn,Uid:cf1319c5-c836-4c8a-8002-1147cc1b3ed7,Namespace:calico-system,Attempt:0,}" Dec 13 14:17:01.805837 env[1814]: time="2024-12-13T14:17:01.805718483Z" level=error msg="Failed to destroy network for sandbox \"d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:01.810714 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9-shm.mount: Deactivated successfully. Dec 13 14:17:01.815240 env[1814]: time="2024-12-13T14:17:01.815079121Z" level=error msg="encountered an error cleaning up failed sandbox \"d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:01.815457 env[1814]: time="2024-12-13T14:17:01.815260490Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-c65g5,Uid:a1601850-1168-45e1-aa6f-035031c5398b,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:01.816544 kubelet[2977]: E1213 14:17:01.815895 2977 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:01.816544 kubelet[2977]: E1213 14:17:01.815978 2977 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-c65g5" Dec 13 14:17:01.816544 kubelet[2977]: E1213 14:17:01.816058 2977 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-c65g5" Dec 13 14:17:01.817538 kubelet[2977]: E1213 14:17:01.816150 2977 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-c65g5_kube-system(a1601850-1168-45e1-aa6f-035031c5398b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-c65g5_kube-system(a1601850-1168-45e1-aa6f-035031c5398b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-c65g5" podUID="a1601850-1168-45e1-aa6f-035031c5398b" Dec 13 14:17:01.848534 env[1814]: time="2024-12-13T14:17:01.848450258Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:17:01.996831 env[1814]: time="2024-12-13T14:17:01.996651791Z" level=error msg="Failed to destroy network for sandbox \"88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:02.001743 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0-shm.mount: Deactivated successfully. Dec 13 14:17:02.006275 env[1814]: time="2024-12-13T14:17:02.006186406Z" level=error msg="encountered an error cleaning up failed sandbox \"88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:02.006877 env[1814]: time="2024-12-13T14:17:02.006787597Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-4bslf,Uid:6133c088-e43c-4c97-acbe-a9a4e6ca0a6d,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:02.007410 env[1814]: time="2024-12-13T14:17:02.006699997Z" level=error msg="Failed to destroy network for sandbox \"343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:02.011181 kubelet[2977]: E1213 14:17:02.010379 2977 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:02.011181 kubelet[2977]: E1213 14:17:02.010493 2977 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-4bslf" Dec 13 14:17:02.011181 kubelet[2977]: E1213 14:17:02.010559 2977 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-4bslf" Dec 13 14:17:02.011529 kubelet[2977]: E1213 14:17:02.010660 2977 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-4bslf_kube-system(6133c088-e43c-4c97-acbe-a9a4e6ca0a6d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-4bslf_kube-system(6133c088-e43c-4c97-acbe-a9a4e6ca0a6d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-4bslf" podUID="6133c088-e43c-4c97-acbe-a9a4e6ca0a6d" Dec 13 14:17:02.021588 env[1814]: time="2024-12-13T14:17:02.021439351Z" level=error msg="encountered an error cleaning up failed sandbox \"343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:02.021902 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6-shm.mount: Deactivated successfully. Dec 13 14:17:02.022667 env[1814]: time="2024-12-13T14:17:02.022509276Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bw5cn,Uid:cf1319c5-c836-4c8a-8002-1147cc1b3ed7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:02.024993 kubelet[2977]: E1213 14:17:02.023410 2977 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:02.024993 kubelet[2977]: E1213 14:17:02.023563 2977 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bw5cn" Dec 13 14:17:02.024993 kubelet[2977]: E1213 14:17:02.023605 2977 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bw5cn" Dec 13 14:17:02.025367 kubelet[2977]: E1213 14:17:02.023817 2977 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-bw5cn_calico-system(cf1319c5-c836-4c8a-8002-1147cc1b3ed7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-bw5cn_calico-system(cf1319c5-c836-4c8a-8002-1147cc1b3ed7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bw5cn" podUID="cf1319c5-c836-4c8a-8002-1147cc1b3ed7" Dec 13 14:17:02.040156 env[1814]: time="2024-12-13T14:17:02.039978597Z" level=error msg="Failed to destroy network for sandbox \"0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:02.044862 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a-shm.mount: Deactivated successfully. Dec 13 14:17:02.046470 env[1814]: time="2024-12-13T14:17:02.046319358Z" level=error msg="encountered an error cleaning up failed sandbox \"0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:02.047088 env[1814]: time="2024-12-13T14:17:02.047003218Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67c8d7c486-twvr5,Uid:dcf6065a-3a3d-4bb0-8d44-1814af22309d,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:02.050456 kubelet[2977]: E1213 14:17:02.050038 2977 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:02.050456 kubelet[2977]: E1213 14:17:02.050170 2977 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-67c8d7c486-twvr5" Dec 13 14:17:02.050456 kubelet[2977]: E1213 14:17:02.050236 2977 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-67c8d7c486-twvr5" Dec 13 14:17:02.050854 kubelet[2977]: E1213 14:17:02.050350 2977 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-67c8d7c486-twvr5_calico-apiserver(dcf6065a-3a3d-4bb0-8d44-1814af22309d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-67c8d7c486-twvr5_calico-apiserver(dcf6065a-3a3d-4bb0-8d44-1814af22309d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-67c8d7c486-twvr5" podUID="dcf6065a-3a3d-4bb0-8d44-1814af22309d" Dec 13 14:17:02.064387 env[1814]: time="2024-12-13T14:17:02.064291398Z" level=error msg="Failed to destroy network for sandbox \"5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:02.065299 env[1814]: time="2024-12-13T14:17:02.065194606Z" level=error msg="encountered an error cleaning up failed sandbox \"5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:02.065467 env[1814]: time="2024-12-13T14:17:02.065320319Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6947bb669-zq9km,Uid:8e9f081f-99e6-45b4-9e95-e66a885398fb,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:02.065684 kubelet[2977]: E1213 14:17:02.065622 2977 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:02.065843 kubelet[2977]: E1213 14:17:02.065711 2977 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6947bb669-zq9km" Dec 13 14:17:02.065843 kubelet[2977]: E1213 14:17:02.065758 2977 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6947bb669-zq9km" Dec 13 14:17:02.066007 kubelet[2977]: E1213 14:17:02.065851 2977 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6947bb669-zq9km_calico-system(8e9f081f-99e6-45b4-9e95-e66a885398fb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6947bb669-zq9km_calico-system(8e9f081f-99e6-45b4-9e95-e66a885398fb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6947bb669-zq9km" podUID="8e9f081f-99e6-45b4-9e95-e66a885398fb" Dec 13 14:17:02.091951 env[1814]: time="2024-12-13T14:17:02.091863644Z" level=error msg="Failed to destroy network for sandbox \"b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:02.092742 env[1814]: time="2024-12-13T14:17:02.092626836Z" level=error msg="encountered an error cleaning up failed sandbox \"b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:02.092978 env[1814]: time="2024-12-13T14:17:02.092750856Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67c8d7c486-ncfff,Uid:88fddb2e-ae6a-4869-a25b-6bff4dd7b4da,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:02.093296 kubelet[2977]: E1213 14:17:02.093193 2977 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:02.093463 kubelet[2977]: E1213 14:17:02.093293 2977 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-67c8d7c486-ncfff" Dec 13 14:17:02.093463 kubelet[2977]: E1213 14:17:02.093331 2977 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-67c8d7c486-ncfff" Dec 13 14:17:02.093879 kubelet[2977]: E1213 14:17:02.093447 2977 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-67c8d7c486-ncfff_calico-apiserver(88fddb2e-ae6a-4869-a25b-6bff4dd7b4da)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-67c8d7c486-ncfff_calico-apiserver(88fddb2e-ae6a-4869-a25b-6bff4dd7b4da)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-67c8d7c486-ncfff" podUID="88fddb2e-ae6a-4869-a25b-6bff4dd7b4da" Dec 13 14:17:02.740070 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954-shm.mount: Deactivated successfully. Dec 13 14:17:02.740308 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b-shm.mount: Deactivated successfully. Dec 13 14:17:02.838798 kubelet[2977]: I1213 14:17:02.838706 2977 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" Dec 13 14:17:02.840086 env[1814]: time="2024-12-13T14:17:02.840030801Z" level=info msg="StopPodSandbox for \"d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9\"" Dec 13 14:17:02.842678 kubelet[2977]: I1213 14:17:02.842623 2977 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" Dec 13 14:17:02.844237 env[1814]: time="2024-12-13T14:17:02.843795713Z" level=info msg="StopPodSandbox for \"343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6\"" Dec 13 14:17:02.846780 kubelet[2977]: I1213 14:17:02.846729 2977 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" Dec 13 14:17:02.847754 env[1814]: time="2024-12-13T14:17:02.847702513Z" level=info msg="StopPodSandbox for \"0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a\"" Dec 13 14:17:02.856842 kubelet[2977]: I1213 14:17:02.856780 2977 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" Dec 13 14:17:02.861912 env[1814]: time="2024-12-13T14:17:02.861661143Z" level=info msg="StopPodSandbox for \"b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954\"" Dec 13 14:17:02.863332 kubelet[2977]: I1213 14:17:02.863284 2977 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" Dec 13 14:17:02.868529 env[1814]: time="2024-12-13T14:17:02.868453407Z" level=info msg="StopPodSandbox for \"5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b\"" Dec 13 14:17:02.876157 kubelet[2977]: I1213 14:17:02.876109 2977 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" Dec 13 14:17:02.877087 env[1814]: time="2024-12-13T14:17:02.877023780Z" level=info msg="StopPodSandbox for \"88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0\"" Dec 13 14:17:02.995881 env[1814]: time="2024-12-13T14:17:02.995709197Z" level=error msg="StopPodSandbox for \"343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6\" failed" error="failed to destroy network for sandbox \"343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:02.997183 kubelet[2977]: E1213 14:17:02.997084 2977 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" Dec 13 14:17:02.997366 kubelet[2977]: E1213 14:17:02.997200 2977 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6"} Dec 13 14:17:02.997366 kubelet[2977]: E1213 14:17:02.997304 2977 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cf1319c5-c836-4c8a-8002-1147cc1b3ed7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:17:02.997366 kubelet[2977]: E1213 14:17:02.997342 2977 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cf1319c5-c836-4c8a-8002-1147cc1b3ed7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bw5cn" podUID="cf1319c5-c836-4c8a-8002-1147cc1b3ed7" Dec 13 14:17:03.091380 env[1814]: time="2024-12-13T14:17:03.091300469Z" level=error msg="StopPodSandbox for \"d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9\" failed" error="failed to destroy network for sandbox \"d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:03.091935 kubelet[2977]: E1213 14:17:03.091858 2977 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" Dec 13 14:17:03.092115 kubelet[2977]: E1213 14:17:03.091939 2977 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9"} Dec 13 14:17:03.092115 kubelet[2977]: E1213 14:17:03.092000 2977 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a1601850-1168-45e1-aa6f-035031c5398b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:17:03.092115 kubelet[2977]: E1213 14:17:03.092039 2977 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a1601850-1168-45e1-aa6f-035031c5398b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-c65g5" podUID="a1601850-1168-45e1-aa6f-035031c5398b" Dec 13 14:17:03.098529 env[1814]: time="2024-12-13T14:17:03.098436606Z" level=error msg="StopPodSandbox for \"88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0\" failed" error="failed to destroy network for sandbox \"88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:03.098849 kubelet[2977]: E1213 14:17:03.098751 2977 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" Dec 13 14:17:03.098977 kubelet[2977]: E1213 14:17:03.098849 2977 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0"} Dec 13 14:17:03.098977 kubelet[2977]: E1213 14:17:03.098906 2977 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6133c088-e43c-4c97-acbe-a9a4e6ca0a6d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:17:03.098977 kubelet[2977]: E1213 14:17:03.098959 2977 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6133c088-e43c-4c97-acbe-a9a4e6ca0a6d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-4bslf" podUID="6133c088-e43c-4c97-acbe-a9a4e6ca0a6d" Dec 13 14:17:03.111897 env[1814]: time="2024-12-13T14:17:03.111671883Z" level=error msg="StopPodSandbox for \"0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a\" failed" error="failed to destroy network for sandbox \"0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:03.112692 kubelet[2977]: E1213 14:17:03.112616 2977 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" Dec 13 14:17:03.112935 kubelet[2977]: E1213 14:17:03.112698 2977 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a"} Dec 13 14:17:03.112935 kubelet[2977]: E1213 14:17:03.112757 2977 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"dcf6065a-3a3d-4bb0-8d44-1814af22309d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:17:03.112935 kubelet[2977]: E1213 14:17:03.112797 2977 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"dcf6065a-3a3d-4bb0-8d44-1814af22309d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-67c8d7c486-twvr5" podUID="dcf6065a-3a3d-4bb0-8d44-1814af22309d" Dec 13 14:17:03.140667 env[1814]: time="2024-12-13T14:17:03.140589033Z" level=error msg="StopPodSandbox for \"b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954\" failed" error="failed to destroy network for sandbox \"b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:03.141537 kubelet[2977]: E1213 14:17:03.141199 2977 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" Dec 13 14:17:03.141537 kubelet[2977]: E1213 14:17:03.141276 2977 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954"} Dec 13 14:17:03.141537 kubelet[2977]: E1213 14:17:03.141332 2977 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"88fddb2e-ae6a-4869-a25b-6bff4dd7b4da\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:17:03.141537 kubelet[2977]: E1213 14:17:03.141369 2977 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"88fddb2e-ae6a-4869-a25b-6bff4dd7b4da\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-67c8d7c486-ncfff" podUID="88fddb2e-ae6a-4869-a25b-6bff4dd7b4da" Dec 13 14:17:03.143160 env[1814]: time="2024-12-13T14:17:03.143033986Z" level=error msg="StopPodSandbox for \"5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b\" failed" error="failed to destroy network for sandbox \"5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:17:03.143721 kubelet[2977]: E1213 14:17:03.143653 2977 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" Dec 13 14:17:03.143848 kubelet[2977]: E1213 14:17:03.143725 2977 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b"} Dec 13 14:17:03.143848 kubelet[2977]: E1213 14:17:03.143788 2977 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8e9f081f-99e6-45b4-9e95-e66a885398fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:17:03.144036 kubelet[2977]: E1213 14:17:03.143831 2977 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8e9f081f-99e6-45b4-9e95-e66a885398fb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6947bb669-zq9km" podUID="8e9f081f-99e6-45b4-9e95-e66a885398fb" Dec 13 14:17:10.428917 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1753176003.mount: Deactivated successfully. Dec 13 14:17:10.520461 env[1814]: time="2024-12-13T14:17:10.520391962Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:10.525230 env[1814]: time="2024-12-13T14:17:10.525150248Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:10.529996 env[1814]: time="2024-12-13T14:17:10.529934814Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:10.532997 env[1814]: time="2024-12-13T14:17:10.532937948Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:10.534931 env[1814]: time="2024-12-13T14:17:10.534850397Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758\"" Dec 13 14:17:10.575441 env[1814]: time="2024-12-13T14:17:10.574363735Z" level=info msg="CreateContainer within sandbox \"4da79145bc146636034a6514d5b0dd1cb2e1864d1cfc6d07bfd134680ecb55fa\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:17:10.606051 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3844271970.mount: Deactivated successfully. Dec 13 14:17:10.610519 env[1814]: time="2024-12-13T14:17:10.610443438Z" level=info msg="CreateContainer within sandbox \"4da79145bc146636034a6514d5b0dd1cb2e1864d1cfc6d07bfd134680ecb55fa\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"21724008f72d115a0b4549392a5b3757006a4bce965b6debbc437d7565a68e81\"" Dec 13 14:17:10.614254 env[1814]: time="2024-12-13T14:17:10.612847709Z" level=info msg="StartContainer for \"21724008f72d115a0b4549392a5b3757006a4bce965b6debbc437d7565a68e81\"" Dec 13 14:17:10.650180 systemd[1]: Started cri-containerd-21724008f72d115a0b4549392a5b3757006a4bce965b6debbc437d7565a68e81.scope. Dec 13 14:17:10.710917 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:17:10.711149 kernel: audit: type=1400 audit(1734099430.700:981): avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.700000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.700000 audit[4022]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3424 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:10.726966 kernel: audit: type=1300 audit(1734099430.700:981): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3424 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:10.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231373234303038663732643131356130623435343933393261356233 Dec 13 14:17:10.737798 kernel: audit: type=1327 audit(1734099430.700:981): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231373234303038663732643131356130623435343933393261356233 Dec 13 14:17:10.711000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.745611 kernel: audit: type=1400 audit(1734099430.711:982): avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.711000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.753029 kernel: audit: type=1400 audit(1734099430.711:982): avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.753465 kernel: audit: type=1400 audit(1734099430.711:982): avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.711000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.711000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.771880 kernel: audit: type=1400 audit(1734099430.711:982): avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.772053 kernel: audit: type=1400 audit(1734099430.711:982): avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.711000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.772495 env[1814]: time="2024-12-13T14:17:10.772436565Z" level=info msg="StartContainer for \"21724008f72d115a0b4549392a5b3757006a4bce965b6debbc437d7565a68e81\" returns successfully" Dec 13 14:17:10.711000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.785828 kernel: audit: type=1400 audit(1734099430.711:982): avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.711000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.793700 kernel: audit: type=1400 audit(1734099430.711:982): avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.711000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.711000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.711000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.711000 audit: BPF prog-id=136 op=LOAD Dec 13 14:17:10.711000 audit[4022]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3424 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:10.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231373234303038663732643131356130623435343933393261356233 Dec 13 14:17:10.711000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.711000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.711000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.711000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.711000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.711000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.711000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.711000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.711000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.711000 audit: BPF prog-id=137 op=LOAD Dec 13 14:17:10.711000 audit[4022]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3424 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:10.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231373234303038663732643131356130623435343933393261356233 Dec 13 14:17:10.712000 audit: BPF prog-id=137 op=UNLOAD Dec 13 14:17:10.712000 audit: BPF prog-id=136 op=UNLOAD Dec 13 14:17:10.712000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.712000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.712000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.712000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.712000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.712000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.712000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.712000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.712000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.712000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:10.712000 audit: BPF prog-id=138 op=LOAD Dec 13 14:17:10.712000 audit[4022]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3424 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:10.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231373234303038663732643131356130623435343933393261356233 Dec 13 14:17:10.939356 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:17:10.939589 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:17:10.950010 kubelet[2977]: I1213 14:17:10.949464 2977 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-5t44d" podStartSLOduration=1.72593973 podStartE2EDuration="23.949415338s" podCreationTimestamp="2024-12-13 14:16:47 +0000 UTC" firstStartedPulling="2024-12-13 14:16:48.314355183 +0000 UTC m=+14.981863800" lastFinishedPulling="2024-12-13 14:17:10.537830779 +0000 UTC m=+37.205339408" observedRunningTime="2024-12-13 14:17:10.94861011 +0000 UTC m=+37.616118763" watchObservedRunningTime="2024-12-13 14:17:10.949415338 +0000 UTC m=+37.616923979" Dec 13 14:17:11.956936 systemd[1]: run-containerd-runc-k8s.io-21724008f72d115a0b4549392a5b3757006a4bce965b6debbc437d7565a68e81-runc.tTHdQx.mount: Deactivated successfully. Dec 13 14:17:12.737000 audit[4171]: AVC avc: denied { write } for pid=4171 comm="tee" name="fd" dev="proc" ino=20841 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:17:12.737000 audit[4171]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffccb42a1e a2=241 a3=1b6 items=1 ppid=4141 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.737000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:17:12.737000 audit: PATH item=0 name="/dev/fd/63" inode=20832 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:12.737000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:17:12.750000 audit[4173]: AVC avc: denied { write } for pid=4173 comm="tee" name="fd" dev="proc" ino=21878 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:17:12.750000 audit[4173]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe7035a1c a2=241 a3=1b6 items=1 ppid=4131 pid=4173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.750000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:17:12.750000 audit: PATH item=0 name="/dev/fd/63" inode=21867 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:12.750000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:17:12.777000 audit[4179]: AVC avc: denied { write } for pid=4179 comm="tee" name="fd" dev="proc" ino=20854 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:17:12.777000 audit[4179]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe3fc1a0d a2=241 a3=1b6 items=1 ppid=4143 pid=4179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.777000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:17:12.777000 audit: PATH item=0 name="/dev/fd/63" inode=21870 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:12.777000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:17:12.792000 audit[4199]: AVC avc: denied { write } for pid=4199 comm="tee" name="fd" dev="proc" ino=20858 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:17:12.794000 audit[4201]: AVC avc: denied { write } for pid=4201 comm="tee" name="fd" dev="proc" ino=21884 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:17:12.797000 audit[4203]: AVC avc: denied { write } for pid=4203 comm="tee" name="fd" dev="proc" ino=20861 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:17:12.792000 audit[4199]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd6d00a1d a2=241 a3=1b6 items=1 ppid=4142 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.792000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:17:12.792000 audit: PATH item=0 name="/dev/fd/63" inode=20850 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:12.792000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:17:12.797000 audit[4194]: AVC avc: denied { write } for pid=4194 comm="tee" name="fd" dev="proc" ino=20865 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:17:12.794000 audit[4201]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe6deba1c a2=241 a3=1b6 items=1 ppid=4135 pid=4201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.794000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:17:12.794000 audit: PATH item=0 name="/dev/fd/63" inode=21880 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:12.794000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:17:12.797000 audit[4194]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc9d08a0c a2=241 a3=1b6 items=1 ppid=4132 pid=4194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.797000 audit[4203]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcbf7fa1c a2=241 a3=1b6 items=1 ppid=4139 pid=4203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:12.797000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:17:12.797000 audit: PATH item=0 name="/dev/fd/63" inode=21872 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:12.797000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:17:12.797000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:17:12.797000 audit: PATH item=0 name="/dev/fd/63" inode=21881 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:12.797000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:17:13.202000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.202000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.202000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.202000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.202000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.202000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.202000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.202000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.202000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.202000 audit: BPF prog-id=139 op=LOAD Dec 13 14:17:13.202000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff65b2eb8 a2=98 a3=fffff65b2ea8 items=0 ppid=4133 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.202000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:13.204000 audit: BPF prog-id=139 op=UNLOAD Dec 13 14:17:13.205000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.205000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.205000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.205000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.205000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.205000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.205000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.205000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.205000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.205000 audit: BPF prog-id=140 op=LOAD Dec 13 14:17:13.205000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff65b2b48 a2=74 a3=95 items=0 ppid=4133 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.205000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:13.205000 audit: BPF prog-id=140 op=UNLOAD Dec 13 14:17:13.205000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.205000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.205000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.205000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.205000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.205000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.205000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.205000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.205000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.205000 audit: BPF prog-id=141 op=LOAD Dec 13 14:17:13.205000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff65b2ba8 a2=94 a3=2 items=0 ppid=4133 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.205000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:13.206000 audit: BPF prog-id=141 op=UNLOAD Dec 13 14:17:13.559000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.559000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.559000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.559000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.559000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.559000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.559000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.559000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.559000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.559000 audit: BPF prog-id=142 op=LOAD Dec 13 14:17:13.559000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff65b2b68 a2=40 a3=fffff65b2b98 items=0 ppid=4133 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.559000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:13.560000 audit: BPF prog-id=142 op=UNLOAD Dec 13 14:17:13.560000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.560000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffff65b2c80 a2=50 a3=0 items=0 ppid=4133 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.560000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:13.577000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.577000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff65b2bd8 a2=28 a3=fffff65b2d08 items=0 ppid=4133 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.577000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:13.577000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.577000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff65b2c08 a2=28 a3=fffff65b2d38 items=0 ppid=4133 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.577000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:13.577000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.577000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff65b2ab8 a2=28 a3=fffff65b2be8 items=0 ppid=4133 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.577000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:13.577000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.577000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff65b2c28 a2=28 a3=fffff65b2d58 items=0 ppid=4133 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.577000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:13.577000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.577000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff65b2c08 a2=28 a3=fffff65b2d38 items=0 ppid=4133 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.577000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:13.577000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.577000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff65b2bf8 a2=28 a3=fffff65b2d28 items=0 ppid=4133 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.577000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:13.577000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.577000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff65b2c28 a2=28 a3=fffff65b2d58 items=0 ppid=4133 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.577000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:13.577000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.577000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff65b2c08 a2=28 a3=fffff65b2d38 items=0 ppid=4133 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.577000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:13.577000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.577000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff65b2c28 a2=28 a3=fffff65b2d58 items=0 ppid=4133 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.577000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:13.577000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.577000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff65b2bf8 a2=28 a3=fffff65b2d28 items=0 ppid=4133 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.577000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:13.577000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.577000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff65b2c78 a2=28 a3=fffff65b2db8 items=0 ppid=4133 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.577000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:13.578000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.578000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff65b29b0 a2=50 a3=0 items=0 ppid=4133 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.578000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:13.578000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.578000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.578000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.578000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.578000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.578000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.578000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.578000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.578000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.578000 audit: BPF prog-id=143 op=LOAD Dec 13 14:17:13.578000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff65b29b8 a2=94 a3=5 items=0 ppid=4133 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.578000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:13.578000 audit: BPF prog-id=143 op=UNLOAD Dec 13 14:17:13.578000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.578000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff65b2ac0 a2=50 a3=0 items=0 ppid=4133 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.578000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:13.578000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.578000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffff65b2c08 a2=4 a3=3 items=0 ppid=4133 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.578000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:13.578000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.578000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.578000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.578000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.578000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.578000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.578000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.578000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.578000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.578000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.578000 audit[4222]: AVC avc: denied { confidentiality } for pid=4222 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:13.578000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff65b2be8 a2=94 a3=6 items=0 ppid=4133 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.578000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:13.579000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.579000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.579000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.579000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.579000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.579000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.579000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.579000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.579000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.579000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.579000 audit[4222]: AVC avc: denied { confidentiality } for pid=4222 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:13.579000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff65b23b8 a2=94 a3=83 items=0 ppid=4133 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.579000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:13.579000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.579000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.579000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.579000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.579000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.579000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.579000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.579000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.579000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.579000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.579000 audit[4222]: AVC avc: denied { confidentiality } for pid=4222 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:13.579000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff65b23b8 a2=94 a3=83 items=0 ppid=4133 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.579000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:17:13.611000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.611000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.611000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.611000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.611000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.611000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.611000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.611000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.611000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.611000 audit: BPF prog-id=144 op=LOAD Dec 13 14:17:13.611000 audit[4246]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffda121c38 a2=98 a3=ffffda121c28 items=0 ppid=4133 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.611000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:17:13.613000 audit: BPF prog-id=144 op=UNLOAD Dec 13 14:17:13.613000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.613000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.613000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.613000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.613000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.613000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.613000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.613000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.613000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.613000 audit: BPF prog-id=145 op=LOAD Dec 13 14:17:13.613000 audit[4246]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffda121ae8 a2=74 a3=95 items=0 ppid=4133 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.613000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:17:13.615000 audit: BPF prog-id=145 op=UNLOAD Dec 13 14:17:13.615000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.615000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.615000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.615000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.615000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.615000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.615000 audit[4246]: AVC avc: denied { perfmon } for pid=4246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.615000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.615000 audit[4246]: AVC avc: denied { bpf } for pid=4246 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.615000 audit: BPF prog-id=146 op=LOAD Dec 13 14:17:13.615000 audit[4246]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffda121b18 a2=40 a3=ffffda121b48 items=0 ppid=4133 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.615000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:17:13.616000 audit: BPF prog-id=146 op=UNLOAD Dec 13 14:17:13.663006 env[1814]: time="2024-12-13T14:17:13.655361993Z" level=info msg="StopPodSandbox for \"0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a\"" Dec 13 14:17:13.832268 systemd-networkd[1534]: vxlan.calico: Link UP Dec 13 14:17:13.832284 systemd-networkd[1534]: vxlan.calico: Gained carrier Dec 13 14:17:13.858586 (udev-worker)[4287]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:17:13.907000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.907000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.907000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.907000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.907000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.907000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.907000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.907000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.907000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.907000 audit: BPF prog-id=147 op=LOAD Dec 13 14:17:13.907000 audit[4296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd0d75ce8 a2=98 a3=ffffd0d75cd8 items=0 ppid=4133 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.907000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:13.908000 audit: BPF prog-id=147 op=UNLOAD Dec 13 14:17:13.908000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.908000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.908000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.908000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.908000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.908000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.908000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.908000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.908000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.908000 audit: BPF prog-id=148 op=LOAD Dec 13 14:17:13.908000 audit[4296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd0d759c8 a2=74 a3=95 items=0 ppid=4133 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.908000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:13.908000 audit: BPF prog-id=148 op=UNLOAD Dec 13 14:17:13.908000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.908000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.908000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.908000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.908000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.908000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.908000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.908000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.908000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.908000 audit: BPF prog-id=149 op=LOAD Dec 13 14:17:13.908000 audit[4296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd0d75a28 a2=94 a3=2 items=0 ppid=4133 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.908000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:13.911000 audit: BPF prog-id=149 op=UNLOAD Dec 13 14:17:13.911000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.911000 audit[4296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd0d75a58 a2=28 a3=ffffd0d75b88 items=0 ppid=4133 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.911000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:13.911000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.911000 audit[4296]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd0d75a88 a2=28 a3=ffffd0d75bb8 items=0 ppid=4133 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.911000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:13.911000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.911000 audit[4296]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd0d75938 a2=28 a3=ffffd0d75a68 items=0 ppid=4133 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.911000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:13.911000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.911000 audit[4296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd0d75aa8 a2=28 a3=ffffd0d75bd8 items=0 ppid=4133 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.911000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:13.911000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.911000 audit[4296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd0d75a88 a2=28 a3=ffffd0d75bb8 items=0 ppid=4133 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.911000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:13.911000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.911000 audit[4296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd0d75a78 a2=28 a3=ffffd0d75ba8 items=0 ppid=4133 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.911000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:13.911000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.911000 audit[4296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd0d75aa8 a2=28 a3=ffffd0d75bd8 items=0 ppid=4133 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.911000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:13.911000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.911000 audit[4296]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd0d75a88 a2=28 a3=ffffd0d75bb8 items=0 ppid=4133 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.911000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:13.911000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.911000 audit[4296]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd0d75aa8 a2=28 a3=ffffd0d75bd8 items=0 ppid=4133 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.911000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:13.911000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.911000 audit[4296]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd0d75a78 a2=28 a3=ffffd0d75ba8 items=0 ppid=4133 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.911000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:13.911000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.911000 audit[4296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd0d75af8 a2=28 a3=ffffd0d75c38 items=0 ppid=4133 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.911000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:13.911000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.911000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.911000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.911000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.911000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.911000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.911000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.911000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.911000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.911000 audit: BPF prog-id=150 op=LOAD Dec 13 14:17:13.911000 audit[4296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd0d75918 a2=40 a3=ffffd0d75948 items=0 ppid=4133 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.911000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:13.912000 audit: BPF prog-id=150 op=UNLOAD Dec 13 14:17:13.913000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.913000 audit[4296]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffd0d75940 a2=50 a3=0 items=0 ppid=4133 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.913000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:13.913000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.913000 audit[4296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffd0d75940 a2=50 a3=0 items=0 ppid=4133 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.913000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:13.913000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.913000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.913000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.913000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.913000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.913000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.913000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.913000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.913000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.913000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.913000 audit: BPF prog-id=151 op=LOAD Dec 13 14:17:13.913000 audit[4296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd0d750a8 a2=94 a3=2 items=0 ppid=4133 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.913000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:13.913000 audit: BPF prog-id=151 op=UNLOAD Dec 13 14:17:13.913000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.913000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.913000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.913000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.913000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.913000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.913000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.913000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.913000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.913000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.913000 audit: BPF prog-id=152 op=LOAD Dec 13 14:17:13.913000 audit[4296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd0d75238 a2=94 a3=2d items=0 ppid=4133 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.913000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:17:13.926000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.928071 (udev-worker)[4299]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:17:13.926000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.926000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.926000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.926000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.926000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.926000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.926000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.926000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.926000 audit: BPF prog-id=153 op=LOAD Dec 13 14:17:13.926000 audit[4300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd1b6bed8 a2=98 a3=ffffd1b6bec8 items=0 ppid=4133 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.926000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:13.931000 audit: BPF prog-id=153 op=UNLOAD Dec 13 14:17:13.932000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.932000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.932000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.932000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.932000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.932000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.932000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.932000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.932000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.932000 audit: BPF prog-id=154 op=LOAD Dec 13 14:17:13.932000 audit[4300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd1b6bb68 a2=74 a3=95 items=0 ppid=4133 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.932000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:13.932000 audit: BPF prog-id=154 op=UNLOAD Dec 13 14:17:13.932000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.932000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.932000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.932000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.932000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.932000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.932000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.932000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.932000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:13.932000 audit: BPF prog-id=155 op=LOAD Dec 13 14:17:13.932000 audit[4300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd1b6bbc8 a2=94 a3=2 items=0 ppid=4133 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:13.932000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:13.932000 audit: BPF prog-id=155 op=UNLOAD Dec 13 14:17:13.928886 (udev-worker)[4298]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:17:14.152664 env[1814]: 2024-12-13 14:17:13.975 [INFO][4276] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" Dec 13 14:17:14.152664 env[1814]: 2024-12-13 14:17:13.976 [INFO][4276] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" iface="eth0" netns="/var/run/netns/cni-ca63923f-c133-82dc-2f6a-691744f98b65" Dec 13 14:17:14.152664 env[1814]: 2024-12-13 14:17:13.976 [INFO][4276] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" iface="eth0" netns="/var/run/netns/cni-ca63923f-c133-82dc-2f6a-691744f98b65" Dec 13 14:17:14.152664 env[1814]: 2024-12-13 14:17:13.977 [INFO][4276] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" iface="eth0" netns="/var/run/netns/cni-ca63923f-c133-82dc-2f6a-691744f98b65" Dec 13 14:17:14.152664 env[1814]: 2024-12-13 14:17:13.977 [INFO][4276] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" Dec 13 14:17:14.152664 env[1814]: 2024-12-13 14:17:13.977 [INFO][4276] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" Dec 13 14:17:14.152664 env[1814]: 2024-12-13 14:17:14.117 [INFO][4303] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" HandleID="k8s-pod-network.0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" Workload="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--twvr5-eth0" Dec 13 14:17:14.152664 env[1814]: 2024-12-13 14:17:14.118 [INFO][4303] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:14.152664 env[1814]: 2024-12-13 14:17:14.118 [INFO][4303] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:14.152664 env[1814]: 2024-12-13 14:17:14.137 [WARNING][4303] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" HandleID="k8s-pod-network.0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" Workload="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--twvr5-eth0" Dec 13 14:17:14.152664 env[1814]: 2024-12-13 14:17:14.137 [INFO][4303] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" HandleID="k8s-pod-network.0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" Workload="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--twvr5-eth0" Dec 13 14:17:14.152664 env[1814]: 2024-12-13 14:17:14.140 [INFO][4303] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:14.152664 env[1814]: 2024-12-13 14:17:14.149 [INFO][4276] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" Dec 13 14:17:14.157394 env[1814]: time="2024-12-13T14:17:14.157320072Z" level=info msg="TearDown network for sandbox \"0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a\" successfully" Dec 13 14:17:14.157616 env[1814]: time="2024-12-13T14:17:14.157571677Z" level=info msg="StopPodSandbox for \"0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a\" returns successfully" Dec 13 14:17:14.162712 systemd[1]: run-netns-cni\x2dca63923f\x2dc133\x2d82dc\x2d2f6a\x2d691744f98b65.mount: Deactivated successfully. Dec 13 14:17:14.167515 env[1814]: time="2024-12-13T14:17:14.167431281Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67c8d7c486-twvr5,Uid:dcf6065a-3a3d-4bb0-8d44-1814af22309d,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:17:14.264000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.264000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.264000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.264000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.264000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.264000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.264000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.264000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.264000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.264000 audit: BPF prog-id=156 op=LOAD Dec 13 14:17:14.264000 audit[4300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd1b6bb88 a2=40 a3=ffffd1b6bbb8 items=0 ppid=4133 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.264000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:14.267000 audit: BPF prog-id=156 op=UNLOAD Dec 13 14:17:14.267000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.267000 audit[4300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffd1b6bca0 a2=50 a3=0 items=0 ppid=4133 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.267000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:14.292000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.292000 audit[4300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd1b6bbf8 a2=28 a3=ffffd1b6bd28 items=0 ppid=4133 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.292000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:14.292000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.292000 audit[4300]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd1b6bc28 a2=28 a3=ffffd1b6bd58 items=0 ppid=4133 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.292000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:14.292000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.292000 audit[4300]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd1b6bad8 a2=28 a3=ffffd1b6bc08 items=0 ppid=4133 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.292000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:14.292000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.292000 audit[4300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd1b6bc48 a2=28 a3=ffffd1b6bd78 items=0 ppid=4133 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.292000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:14.292000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.292000 audit[4300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd1b6bc28 a2=28 a3=ffffd1b6bd58 items=0 ppid=4133 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.292000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit[4300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd1b6bc18 a2=28 a3=ffffd1b6bd48 items=0 ppid=4133 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit[4300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd1b6bc48 a2=28 a3=ffffd1b6bd78 items=0 ppid=4133 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit[4300]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd1b6bc28 a2=28 a3=ffffd1b6bd58 items=0 ppid=4133 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit[4300]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd1b6bc48 a2=28 a3=ffffd1b6bd78 items=0 ppid=4133 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit[4300]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd1b6bc18 a2=28 a3=ffffd1b6bd48 items=0 ppid=4133 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit[4300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd1b6bc98 a2=28 a3=ffffd1b6bdd8 items=0 ppid=4133 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit[4300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd1b6b9d0 a2=50 a3=0 items=0 ppid=4133 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit: BPF prog-id=157 op=LOAD Dec 13 14:17:14.293000 audit[4300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd1b6b9d8 a2=94 a3=5 items=0 ppid=4133 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:14.293000 audit: BPF prog-id=157 op=UNLOAD Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit[4300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd1b6bae0 a2=50 a3=0 items=0 ppid=4133 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit[4300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffd1b6bc28 a2=4 a3=3 items=0 ppid=4133 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.293000 audit[4300]: AVC avc: denied { confidentiality } for pid=4300 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:14.293000 audit[4300]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd1b6bc08 a2=94 a3=6 items=0 ppid=4133 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:14.294000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.294000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.294000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.294000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.294000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.294000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.294000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.294000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.294000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.294000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.294000 audit[4300]: AVC avc: denied { confidentiality } for pid=4300 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:17:14.294000 audit[4300]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd1b6b3d8 a2=94 a3=83 items=0 ppid=4133 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.294000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:14.294000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.294000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.294000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.294000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.294000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.294000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.294000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.294000 audit[4300]: AVC avc: denied { perfmon } for pid=4300 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.294000 audit[4300]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd1b6b3d8 a2=94 a3=83 items=0 ppid=4133 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.294000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:14.296000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.296000 audit[4300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd1b6ce18 a2=10 a3=ffffd1b6cf08 items=0 ppid=4133 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.296000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:14.298000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.298000 audit[4300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd1b6ccd8 a2=10 a3=ffffd1b6cdc8 items=0 ppid=4133 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.298000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:14.298000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.298000 audit[4300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd1b6cc48 a2=10 a3=ffffd1b6cdc8 items=0 ppid=4133 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.298000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:14.298000 audit[4300]: AVC avc: denied { bpf } for pid=4300 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.298000 audit[4300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd1b6cc48 a2=10 a3=ffffd1b6cdc8 items=0 ppid=4133 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.298000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:17:14.317000 audit: BPF prog-id=152 op=UNLOAD Dec 13 14:17:14.480503 (udev-worker)[4056]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:17:14.490132 systemd-networkd[1534]: cali512a23e0207: Link UP Dec 13 14:17:14.501203 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali512a23e0207: link becomes ready Dec 13 14:17:14.501048 systemd-networkd[1534]: cali512a23e0207: Gained carrier Dec 13 14:17:14.535673 env[1814]: 2024-12-13 14:17:14.291 [INFO][4311] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--twvr5-eth0 calico-apiserver-67c8d7c486- calico-apiserver dcf6065a-3a3d-4bb0-8d44-1814af22309d 747 0 2024-12-13 14:16:46 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:67c8d7c486 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-31-121 calico-apiserver-67c8d7c486-twvr5 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali512a23e0207 [] []}} ContainerID="ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c" Namespace="calico-apiserver" Pod="calico-apiserver-67c8d7c486-twvr5" WorkloadEndpoint="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--twvr5-" Dec 13 14:17:14.535673 env[1814]: 2024-12-13 14:17:14.292 [INFO][4311] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c" Namespace="calico-apiserver" Pod="calico-apiserver-67c8d7c486-twvr5" WorkloadEndpoint="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--twvr5-eth0" Dec 13 14:17:14.535673 env[1814]: 2024-12-13 14:17:14.376 [INFO][4324] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c" HandleID="k8s-pod-network.ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c" Workload="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--twvr5-eth0" Dec 13 14:17:14.535673 env[1814]: 2024-12-13 14:17:14.398 [INFO][4324] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c" HandleID="k8s-pod-network.ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c" Workload="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--twvr5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000334c80), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-31-121", "pod":"calico-apiserver-67c8d7c486-twvr5", "timestamp":"2024-12-13 14:17:14.376854039 +0000 UTC"}, Hostname:"ip-172-31-31-121", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:17:14.535673 env[1814]: 2024-12-13 14:17:14.399 [INFO][4324] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:14.535673 env[1814]: 2024-12-13 14:17:14.399 [INFO][4324] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:14.535673 env[1814]: 2024-12-13 14:17:14.399 [INFO][4324] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-31-121' Dec 13 14:17:14.535673 env[1814]: 2024-12-13 14:17:14.404 [INFO][4324] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c" host="ip-172-31-31-121" Dec 13 14:17:14.535673 env[1814]: 2024-12-13 14:17:14.414 [INFO][4324] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-31-121" Dec 13 14:17:14.535673 env[1814]: 2024-12-13 14:17:14.425 [INFO][4324] ipam/ipam.go 489: Trying affinity for 192.168.94.64/26 host="ip-172-31-31-121" Dec 13 14:17:14.535673 env[1814]: 2024-12-13 14:17:14.430 [INFO][4324] ipam/ipam.go 155: Attempting to load block cidr=192.168.94.64/26 host="ip-172-31-31-121" Dec 13 14:17:14.535673 env[1814]: 2024-12-13 14:17:14.439 [INFO][4324] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.94.64/26 host="ip-172-31-31-121" Dec 13 14:17:14.535673 env[1814]: 2024-12-13 14:17:14.439 [INFO][4324] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.94.64/26 handle="k8s-pod-network.ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c" host="ip-172-31-31-121" Dec 13 14:17:14.535673 env[1814]: 2024-12-13 14:17:14.445 [INFO][4324] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c Dec 13 14:17:14.535673 env[1814]: 2024-12-13 14:17:14.456 [INFO][4324] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.94.64/26 handle="k8s-pod-network.ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c" host="ip-172-31-31-121" Dec 13 14:17:14.535673 env[1814]: 2024-12-13 14:17:14.471 [INFO][4324] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.94.65/26] block=192.168.94.64/26 handle="k8s-pod-network.ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c" host="ip-172-31-31-121" Dec 13 14:17:14.535673 env[1814]: 2024-12-13 14:17:14.471 [INFO][4324] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.94.65/26] handle="k8s-pod-network.ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c" host="ip-172-31-31-121" Dec 13 14:17:14.535673 env[1814]: 2024-12-13 14:17:14.471 [INFO][4324] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:14.535673 env[1814]: 2024-12-13 14:17:14.471 [INFO][4324] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.94.65/26] IPv6=[] ContainerID="ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c" HandleID="k8s-pod-network.ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c" Workload="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--twvr5-eth0" Dec 13 14:17:14.537182 env[1814]: 2024-12-13 14:17:14.475 [INFO][4311] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c" Namespace="calico-apiserver" Pod="calico-apiserver-67c8d7c486-twvr5" WorkloadEndpoint="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--twvr5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--twvr5-eth0", GenerateName:"calico-apiserver-67c8d7c486-", Namespace:"calico-apiserver", SelfLink:"", UID:"dcf6065a-3a3d-4bb0-8d44-1814af22309d", ResourceVersion:"747", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67c8d7c486", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-121", ContainerID:"", Pod:"calico-apiserver-67c8d7c486-twvr5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.94.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali512a23e0207", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:14.537182 env[1814]: 2024-12-13 14:17:14.476 [INFO][4311] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.94.65/32] ContainerID="ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c" Namespace="calico-apiserver" Pod="calico-apiserver-67c8d7c486-twvr5" WorkloadEndpoint="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--twvr5-eth0" Dec 13 14:17:14.537182 env[1814]: 2024-12-13 14:17:14.476 [INFO][4311] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali512a23e0207 ContainerID="ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c" Namespace="calico-apiserver" Pod="calico-apiserver-67c8d7c486-twvr5" WorkloadEndpoint="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--twvr5-eth0" Dec 13 14:17:14.537182 env[1814]: 2024-12-13 14:17:14.505 [INFO][4311] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c" Namespace="calico-apiserver" Pod="calico-apiserver-67c8d7c486-twvr5" WorkloadEndpoint="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--twvr5-eth0" Dec 13 14:17:14.537182 env[1814]: 2024-12-13 14:17:14.506 [INFO][4311] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c" Namespace="calico-apiserver" Pod="calico-apiserver-67c8d7c486-twvr5" WorkloadEndpoint="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--twvr5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--twvr5-eth0", GenerateName:"calico-apiserver-67c8d7c486-", Namespace:"calico-apiserver", SelfLink:"", UID:"dcf6065a-3a3d-4bb0-8d44-1814af22309d", ResourceVersion:"747", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67c8d7c486", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-121", ContainerID:"ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c", Pod:"calico-apiserver-67c8d7c486-twvr5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.94.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali512a23e0207", MAC:"ce:37:b9:38:64:f7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:14.537182 env[1814]: 2024-12-13 14:17:14.531 [INFO][4311] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c" Namespace="calico-apiserver" Pod="calico-apiserver-67c8d7c486-twvr5" WorkloadEndpoint="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--twvr5-eth0" Dec 13 14:17:14.567000 audit[4354]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=4354 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:14.567000 audit[4354]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=fffffde18af0 a2=0 a3=ffffbb614fa8 items=0 ppid=4133 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.567000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:14.571000 audit[4351]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=4351 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:14.571000 audit[4351]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffcd15f820 a2=0 a3=ffffafc97fa8 items=0 ppid=4133 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.571000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:14.579212 env[1814]: time="2024-12-13T14:17:14.578456315Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:17:14.579212 env[1814]: time="2024-12-13T14:17:14.578555760Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:17:14.579212 env[1814]: time="2024-12-13T14:17:14.578583228Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:17:14.579212 env[1814]: time="2024-12-13T14:17:14.578886109Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c pid=4375 runtime=io.containerd.runc.v2 Dec 13 14:17:14.580000 audit[4352]: NETFILTER_CFG table=raw:99 family=2 entries=21 op=nft_register_chain pid=4352 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:14.580000 audit[4352]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffcbe59b10 a2=0 a3=ffffaedc3fa8 items=0 ppid=4133 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.580000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:14.618804 systemd[1]: Started cri-containerd-ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c.scope. Dec 13 14:17:14.623000 audit[4366]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=4366 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:14.623000 audit[4366]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffdf947720 a2=0 a3=ffff8b80dfa8 items=0 ppid=4133 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.623000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:14.651706 env[1814]: time="2024-12-13T14:17:14.651639968Z" level=info msg="StopPodSandbox for \"5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b\"" Dec 13 14:17:14.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.709000 audit: BPF prog-id=158 op=LOAD Dec 13 14:17:14.712000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.712000 audit[4385]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4375 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666613239663234333533376139313832653735656530363034623832 Dec 13 14:17:14.713000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.713000 audit[4385]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4375 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666613239663234333533376139313832653735656530363034623832 Dec 13 14:17:14.714000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.714000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.714000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.714000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.714000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.714000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.714000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.714000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.714000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.714000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.714000 audit: BPF prog-id=159 op=LOAD Dec 13 14:17:14.714000 audit[4385]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4375 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666613239663234333533376139313832653735656530363034623832 Dec 13 14:17:14.719000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.719000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.719000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.719000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.719000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.719000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.719000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.719000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.719000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.719000 audit: BPF prog-id=160 op=LOAD Dec 13 14:17:14.719000 audit[4385]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4375 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666613239663234333533376139313832653735656530363034623832 Dec 13 14:17:14.722000 audit: BPF prog-id=160 op=UNLOAD Dec 13 14:17:14.722000 audit: BPF prog-id=159 op=UNLOAD Dec 13 14:17:14.723000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.723000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.723000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.723000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.723000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.723000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.723000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.723000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.723000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.723000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:14.723000 audit: BPF prog-id=161 op=LOAD Dec 13 14:17:14.723000 audit[4385]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4375 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666613239663234333533376139313832653735656530363034623832 Dec 13 14:17:14.735000 audit[4426]: NETFILTER_CFG table=filter:101 family=2 entries=40 op=nft_register_chain pid=4426 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:14.735000 audit[4426]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23492 a0=3 a1=fffff23c71b0 a2=0 a3=ffffb710bfa8 items=0 ppid=4133 pid=4426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:14.735000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:14.790494 env[1814]: time="2024-12-13T14:17:14.790418009Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67c8d7c486-twvr5,Uid:dcf6065a-3a3d-4bb0-8d44-1814af22309d,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c\"" Dec 13 14:17:14.796409 env[1814]: time="2024-12-13T14:17:14.794820612Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:17:14.932006 env[1814]: 2024-12-13 14:17:14.856 [INFO][4413] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" Dec 13 14:17:14.932006 env[1814]: 2024-12-13 14:17:14.856 [INFO][4413] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" iface="eth0" netns="/var/run/netns/cni-30a332a9-6bad-d027-8558-ee6088beabcf" Dec 13 14:17:14.932006 env[1814]: 2024-12-13 14:17:14.857 [INFO][4413] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" iface="eth0" netns="/var/run/netns/cni-30a332a9-6bad-d027-8558-ee6088beabcf" Dec 13 14:17:14.932006 env[1814]: 2024-12-13 14:17:14.857 [INFO][4413] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" iface="eth0" netns="/var/run/netns/cni-30a332a9-6bad-d027-8558-ee6088beabcf" Dec 13 14:17:14.932006 env[1814]: 2024-12-13 14:17:14.857 [INFO][4413] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" Dec 13 14:17:14.932006 env[1814]: 2024-12-13 14:17:14.857 [INFO][4413] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" Dec 13 14:17:14.932006 env[1814]: 2024-12-13 14:17:14.900 [INFO][4434] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" HandleID="k8s-pod-network.5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" Workload="ip--172--31--31--121-k8s-calico--kube--controllers--6947bb669--zq9km-eth0" Dec 13 14:17:14.932006 env[1814]: 2024-12-13 14:17:14.901 [INFO][4434] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:14.932006 env[1814]: 2024-12-13 14:17:14.901 [INFO][4434] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:14.932006 env[1814]: 2024-12-13 14:17:14.918 [WARNING][4434] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" HandleID="k8s-pod-network.5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" Workload="ip--172--31--31--121-k8s-calico--kube--controllers--6947bb669--zq9km-eth0" Dec 13 14:17:14.932006 env[1814]: 2024-12-13 14:17:14.918 [INFO][4434] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" HandleID="k8s-pod-network.5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" Workload="ip--172--31--31--121-k8s-calico--kube--controllers--6947bb669--zq9km-eth0" Dec 13 14:17:14.932006 env[1814]: 2024-12-13 14:17:14.921 [INFO][4434] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:14.932006 env[1814]: 2024-12-13 14:17:14.924 [INFO][4413] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" Dec 13 14:17:14.933652 env[1814]: time="2024-12-13T14:17:14.933530877Z" level=info msg="TearDown network for sandbox \"5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b\" successfully" Dec 13 14:17:14.933928 env[1814]: time="2024-12-13T14:17:14.933872878Z" level=info msg="StopPodSandbox for \"5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b\" returns successfully" Dec 13 14:17:14.935432 env[1814]: time="2024-12-13T14:17:14.935367845Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6947bb669-zq9km,Uid:8e9f081f-99e6-45b4-9e95-e66a885398fb,Namespace:calico-system,Attempt:1,}" Dec 13 14:17:15.161959 systemd[1]: run-netns-cni\x2d30a332a9\x2d6bad\x2dd027\x2d8558\x2dee6088beabcf.mount: Deactivated successfully. Dec 13 14:17:15.218756 systemd-networkd[1534]: cali796a79abca2: Link UP Dec 13 14:17:15.226113 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:17:15.226351 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali796a79abca2: link becomes ready Dec 13 14:17:15.226699 systemd-networkd[1534]: cali796a79abca2: Gained carrier Dec 13 14:17:15.262919 env[1814]: 2024-12-13 14:17:15.039 [INFO][4442] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--31--121-k8s-calico--kube--controllers--6947bb669--zq9km-eth0 calico-kube-controllers-6947bb669- calico-system 8e9f081f-99e6-45b4-9e95-e66a885398fb 754 0 2024-12-13 14:16:48 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6947bb669 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-31-121 calico-kube-controllers-6947bb669-zq9km eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali796a79abca2 [] []}} ContainerID="e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5" Namespace="calico-system" Pod="calico-kube-controllers-6947bb669-zq9km" WorkloadEndpoint="ip--172--31--31--121-k8s-calico--kube--controllers--6947bb669--zq9km-" Dec 13 14:17:15.262919 env[1814]: 2024-12-13 14:17:15.040 [INFO][4442] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5" Namespace="calico-system" Pod="calico-kube-controllers-6947bb669-zq9km" WorkloadEndpoint="ip--172--31--31--121-k8s-calico--kube--controllers--6947bb669--zq9km-eth0" Dec 13 14:17:15.262919 env[1814]: 2024-12-13 14:17:15.123 [INFO][4453] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5" HandleID="k8s-pod-network.e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5" Workload="ip--172--31--31--121-k8s-calico--kube--controllers--6947bb669--zq9km-eth0" Dec 13 14:17:15.262919 env[1814]: 2024-12-13 14:17:15.143 [INFO][4453] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5" HandleID="k8s-pod-network.e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5" Workload="ip--172--31--31--121-k8s-calico--kube--controllers--6947bb669--zq9km-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003009e0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-31-121", "pod":"calico-kube-controllers-6947bb669-zq9km", "timestamp":"2024-12-13 14:17:15.123239655 +0000 UTC"}, Hostname:"ip-172-31-31-121", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:17:15.262919 env[1814]: 2024-12-13 14:17:15.144 [INFO][4453] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:15.262919 env[1814]: 2024-12-13 14:17:15.144 [INFO][4453] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:15.262919 env[1814]: 2024-12-13 14:17:15.144 [INFO][4453] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-31-121' Dec 13 14:17:15.262919 env[1814]: 2024-12-13 14:17:15.148 [INFO][4453] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5" host="ip-172-31-31-121" Dec 13 14:17:15.262919 env[1814]: 2024-12-13 14:17:15.165 [INFO][4453] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-31-121" Dec 13 14:17:15.262919 env[1814]: 2024-12-13 14:17:15.175 [INFO][4453] ipam/ipam.go 489: Trying affinity for 192.168.94.64/26 host="ip-172-31-31-121" Dec 13 14:17:15.262919 env[1814]: 2024-12-13 14:17:15.179 [INFO][4453] ipam/ipam.go 155: Attempting to load block cidr=192.168.94.64/26 host="ip-172-31-31-121" Dec 13 14:17:15.262919 env[1814]: 2024-12-13 14:17:15.183 [INFO][4453] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.94.64/26 host="ip-172-31-31-121" Dec 13 14:17:15.262919 env[1814]: 2024-12-13 14:17:15.184 [INFO][4453] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.94.64/26 handle="k8s-pod-network.e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5" host="ip-172-31-31-121" Dec 13 14:17:15.262919 env[1814]: 2024-12-13 14:17:15.186 [INFO][4453] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5 Dec 13 14:17:15.262919 env[1814]: 2024-12-13 14:17:15.195 [INFO][4453] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.94.64/26 handle="k8s-pod-network.e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5" host="ip-172-31-31-121" Dec 13 14:17:15.262919 env[1814]: 2024-12-13 14:17:15.208 [INFO][4453] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.94.66/26] block=192.168.94.64/26 handle="k8s-pod-network.e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5" host="ip-172-31-31-121" Dec 13 14:17:15.262919 env[1814]: 2024-12-13 14:17:15.208 [INFO][4453] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.94.66/26] handle="k8s-pod-network.e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5" host="ip-172-31-31-121" Dec 13 14:17:15.262919 env[1814]: 2024-12-13 14:17:15.208 [INFO][4453] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:15.262919 env[1814]: 2024-12-13 14:17:15.209 [INFO][4453] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.94.66/26] IPv6=[] ContainerID="e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5" HandleID="k8s-pod-network.e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5" Workload="ip--172--31--31--121-k8s-calico--kube--controllers--6947bb669--zq9km-eth0" Dec 13 14:17:15.264620 env[1814]: 2024-12-13 14:17:15.212 [INFO][4442] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5" Namespace="calico-system" Pod="calico-kube-controllers-6947bb669-zq9km" WorkloadEndpoint="ip--172--31--31--121-k8s-calico--kube--controllers--6947bb669--zq9km-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--121-k8s-calico--kube--controllers--6947bb669--zq9km-eth0", GenerateName:"calico-kube-controllers-6947bb669-", Namespace:"calico-system", SelfLink:"", UID:"8e9f081f-99e6-45b4-9e95-e66a885398fb", ResourceVersion:"754", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6947bb669", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-121", ContainerID:"", Pod:"calico-kube-controllers-6947bb669-zq9km", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.94.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali796a79abca2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:15.264620 env[1814]: 2024-12-13 14:17:15.212 [INFO][4442] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.94.66/32] ContainerID="e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5" Namespace="calico-system" Pod="calico-kube-controllers-6947bb669-zq9km" WorkloadEndpoint="ip--172--31--31--121-k8s-calico--kube--controllers--6947bb669--zq9km-eth0" Dec 13 14:17:15.264620 env[1814]: 2024-12-13 14:17:15.212 [INFO][4442] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali796a79abca2 ContainerID="e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5" Namespace="calico-system" Pod="calico-kube-controllers-6947bb669-zq9km" WorkloadEndpoint="ip--172--31--31--121-k8s-calico--kube--controllers--6947bb669--zq9km-eth0" Dec 13 14:17:15.264620 env[1814]: 2024-12-13 14:17:15.229 [INFO][4442] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5" Namespace="calico-system" Pod="calico-kube-controllers-6947bb669-zq9km" WorkloadEndpoint="ip--172--31--31--121-k8s-calico--kube--controllers--6947bb669--zq9km-eth0" Dec 13 14:17:15.264620 env[1814]: 2024-12-13 14:17:15.231 [INFO][4442] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5" Namespace="calico-system" Pod="calico-kube-controllers-6947bb669-zq9km" WorkloadEndpoint="ip--172--31--31--121-k8s-calico--kube--controllers--6947bb669--zq9km-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--121-k8s-calico--kube--controllers--6947bb669--zq9km-eth0", GenerateName:"calico-kube-controllers-6947bb669-", Namespace:"calico-system", SelfLink:"", UID:"8e9f081f-99e6-45b4-9e95-e66a885398fb", ResourceVersion:"754", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6947bb669", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-121", ContainerID:"e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5", Pod:"calico-kube-controllers-6947bb669-zq9km", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.94.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali796a79abca2", MAC:"76:a2:fa:12:f4:36", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:15.264620 env[1814]: 2024-12-13 14:17:15.253 [INFO][4442] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5" Namespace="calico-system" Pod="calico-kube-controllers-6947bb669-zq9km" WorkloadEndpoint="ip--172--31--31--121-k8s-calico--kube--controllers--6947bb669--zq9km-eth0" Dec 13 14:17:15.298000 audit[4476]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=4476 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:15.298000 audit[4476]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20336 a0=3 a1=ffffe8b4c210 a2=0 a3=ffff96495fa8 items=0 ppid=4133 pid=4476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:15.298000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:15.302250 env[1814]: time="2024-12-13T14:17:15.301935010Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:17:15.302250 env[1814]: time="2024-12-13T14:17:15.302184563Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:17:15.302437 env[1814]: time="2024-12-13T14:17:15.302262695Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:17:15.303128 env[1814]: time="2024-12-13T14:17:15.302950970Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5 pid=4481 runtime=io.containerd.runc.v2 Dec 13 14:17:15.359583 systemd[1]: run-containerd-runc-k8s.io-e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5-runc.MRMg8C.mount: Deactivated successfully. Dec 13 14:17:15.374149 systemd[1]: Started cri-containerd-e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5.scope. Dec 13 14:17:15.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.399000 audit: BPF prog-id=162 op=LOAD Dec 13 14:17:15.402000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.402000 audit[4491]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4481 pid=4491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:15.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533363038666231626365393737333265383233653461396163366166 Dec 13 14:17:15.403000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.403000 audit[4491]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4481 pid=4491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:15.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533363038666231626365393737333265383233653461396163366166 Dec 13 14:17:15.404000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.404000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.404000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.404000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.404000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.404000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.404000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.404000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.404000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.404000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.404000 audit: BPF prog-id=163 op=LOAD Dec 13 14:17:15.404000 audit[4491]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4481 pid=4491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:15.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533363038666231626365393737333265383233653461396163366166 Dec 13 14:17:15.406000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.406000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.406000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.406000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.406000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.406000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.406000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.406000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.406000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.406000 audit: BPF prog-id=164 op=LOAD Dec 13 14:17:15.406000 audit[4491]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4481 pid=4491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:15.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533363038666231626365393737333265383233653461396163366166 Dec 13 14:17:15.408000 audit: BPF prog-id=164 op=UNLOAD Dec 13 14:17:15.408000 audit: BPF prog-id=163 op=UNLOAD Dec 13 14:17:15.408000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.408000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.408000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.408000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.408000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.408000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.408000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.408000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.408000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.408000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:15.408000 audit: BPF prog-id=165 op=LOAD Dec 13 14:17:15.408000 audit[4491]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4481 pid=4491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:15.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533363038666231626365393737333265383233653461396163366166 Dec 13 14:17:15.468954 env[1814]: time="2024-12-13T14:17:15.468859058Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6947bb669-zq9km,Uid:8e9f081f-99e6-45b4-9e95-e66a885398fb,Namespace:calico-system,Attempt:1,} returns sandbox id \"e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5\"" Dec 13 14:17:15.842482 systemd-networkd[1534]: vxlan.calico: Gained IPv6LL Dec 13 14:17:16.163983 systemd-networkd[1534]: cali512a23e0207: Gained IPv6LL Dec 13 14:17:16.653578 env[1814]: time="2024-12-13T14:17:16.653505774Z" level=info msg="StopPodSandbox for \"343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6\"" Dec 13 14:17:16.802345 systemd-networkd[1534]: cali796a79abca2: Gained IPv6LL Dec 13 14:17:16.933011 env[1814]: 2024-12-13 14:17:16.819 [INFO][4531] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" Dec 13 14:17:16.933011 env[1814]: 2024-12-13 14:17:16.819 [INFO][4531] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" iface="eth0" netns="/var/run/netns/cni-2f11eae3-889c-5973-1c8f-1c4b2796b6dc" Dec 13 14:17:16.933011 env[1814]: 2024-12-13 14:17:16.820 [INFO][4531] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" iface="eth0" netns="/var/run/netns/cni-2f11eae3-889c-5973-1c8f-1c4b2796b6dc" Dec 13 14:17:16.933011 env[1814]: 2024-12-13 14:17:16.821 [INFO][4531] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" iface="eth0" netns="/var/run/netns/cni-2f11eae3-889c-5973-1c8f-1c4b2796b6dc" Dec 13 14:17:16.933011 env[1814]: 2024-12-13 14:17:16.821 [INFO][4531] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" Dec 13 14:17:16.933011 env[1814]: 2024-12-13 14:17:16.821 [INFO][4531] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" Dec 13 14:17:16.933011 env[1814]: 2024-12-13 14:17:16.910 [INFO][4538] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" HandleID="k8s-pod-network.343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" Workload="ip--172--31--31--121-k8s-csi--node--driver--bw5cn-eth0" Dec 13 14:17:16.933011 env[1814]: 2024-12-13 14:17:16.910 [INFO][4538] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:16.933011 env[1814]: 2024-12-13 14:17:16.910 [INFO][4538] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:16.933011 env[1814]: 2024-12-13 14:17:16.924 [WARNING][4538] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" HandleID="k8s-pod-network.343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" Workload="ip--172--31--31--121-k8s-csi--node--driver--bw5cn-eth0" Dec 13 14:17:16.933011 env[1814]: 2024-12-13 14:17:16.924 [INFO][4538] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" HandleID="k8s-pod-network.343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" Workload="ip--172--31--31--121-k8s-csi--node--driver--bw5cn-eth0" Dec 13 14:17:16.933011 env[1814]: 2024-12-13 14:17:16.927 [INFO][4538] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:16.933011 env[1814]: 2024-12-13 14:17:16.930 [INFO][4531] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" Dec 13 14:17:16.937651 systemd[1]: run-netns-cni\x2d2f11eae3\x2d889c\x2d5973\x2d1c8f\x2d1c4b2796b6dc.mount: Deactivated successfully. Dec 13 14:17:16.946334 env[1814]: time="2024-12-13T14:17:16.946274475Z" level=info msg="TearDown network for sandbox \"343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6\" successfully" Dec 13 14:17:16.946638 env[1814]: time="2024-12-13T14:17:16.946572484Z" level=info msg="StopPodSandbox for \"343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6\" returns successfully" Dec 13 14:17:16.950289 env[1814]: time="2024-12-13T14:17:16.950216108Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bw5cn,Uid:cf1319c5-c836-4c8a-8002-1147cc1b3ed7,Namespace:calico-system,Attempt:1,}" Dec 13 14:17:17.281602 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:17:17.282494 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali79b013e6e71: link becomes ready Dec 13 14:17:17.276595 systemd-networkd[1534]: cali79b013e6e71: Link UP Dec 13 14:17:17.281663 systemd-networkd[1534]: cali79b013e6e71: Gained carrier Dec 13 14:17:17.328832 env[1814]: 2024-12-13 14:17:17.091 [INFO][4545] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--31--121-k8s-csi--node--driver--bw5cn-eth0 csi-node-driver- calico-system cf1319c5-c836-4c8a-8002-1147cc1b3ed7 764 0 2024-12-13 14:16:47 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ip-172-31-31-121 csi-node-driver-bw5cn eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali79b013e6e71 [] []}} ContainerID="e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69" Namespace="calico-system" Pod="csi-node-driver-bw5cn" WorkloadEndpoint="ip--172--31--31--121-k8s-csi--node--driver--bw5cn-" Dec 13 14:17:17.328832 env[1814]: 2024-12-13 14:17:17.092 [INFO][4545] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69" Namespace="calico-system" Pod="csi-node-driver-bw5cn" WorkloadEndpoint="ip--172--31--31--121-k8s-csi--node--driver--bw5cn-eth0" Dec 13 14:17:17.328832 env[1814]: 2024-12-13 14:17:17.179 [INFO][4556] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69" HandleID="k8s-pod-network.e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69" Workload="ip--172--31--31--121-k8s-csi--node--driver--bw5cn-eth0" Dec 13 14:17:17.328832 env[1814]: 2024-12-13 14:17:17.210 [INFO][4556] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69" HandleID="k8s-pod-network.e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69" Workload="ip--172--31--31--121-k8s-csi--node--driver--bw5cn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000307620), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-31-121", "pod":"csi-node-driver-bw5cn", "timestamp":"2024-12-13 14:17:17.179218435 +0000 UTC"}, Hostname:"ip-172-31-31-121", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:17:17.328832 env[1814]: 2024-12-13 14:17:17.210 [INFO][4556] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:17.328832 env[1814]: 2024-12-13 14:17:17.210 [INFO][4556] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:17.328832 env[1814]: 2024-12-13 14:17:17.210 [INFO][4556] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-31-121' Dec 13 14:17:17.328832 env[1814]: 2024-12-13 14:17:17.214 [INFO][4556] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69" host="ip-172-31-31-121" Dec 13 14:17:17.328832 env[1814]: 2024-12-13 14:17:17.222 [INFO][4556] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-31-121" Dec 13 14:17:17.328832 env[1814]: 2024-12-13 14:17:17.231 [INFO][4556] ipam/ipam.go 489: Trying affinity for 192.168.94.64/26 host="ip-172-31-31-121" Dec 13 14:17:17.328832 env[1814]: 2024-12-13 14:17:17.235 [INFO][4556] ipam/ipam.go 155: Attempting to load block cidr=192.168.94.64/26 host="ip-172-31-31-121" Dec 13 14:17:17.328832 env[1814]: 2024-12-13 14:17:17.240 [INFO][4556] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.94.64/26 host="ip-172-31-31-121" Dec 13 14:17:17.328832 env[1814]: 2024-12-13 14:17:17.240 [INFO][4556] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.94.64/26 handle="k8s-pod-network.e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69" host="ip-172-31-31-121" Dec 13 14:17:17.328832 env[1814]: 2024-12-13 14:17:17.243 [INFO][4556] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69 Dec 13 14:17:17.328832 env[1814]: 2024-12-13 14:17:17.252 [INFO][4556] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.94.64/26 handle="k8s-pod-network.e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69" host="ip-172-31-31-121" Dec 13 14:17:17.328832 env[1814]: 2024-12-13 14:17:17.267 [INFO][4556] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.94.67/26] block=192.168.94.64/26 handle="k8s-pod-network.e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69" host="ip-172-31-31-121" Dec 13 14:17:17.328832 env[1814]: 2024-12-13 14:17:17.267 [INFO][4556] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.94.67/26] handle="k8s-pod-network.e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69" host="ip-172-31-31-121" Dec 13 14:17:17.328832 env[1814]: 2024-12-13 14:17:17.267 [INFO][4556] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:17.328832 env[1814]: 2024-12-13 14:17:17.267 [INFO][4556] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.94.67/26] IPv6=[] ContainerID="e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69" HandleID="k8s-pod-network.e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69" Workload="ip--172--31--31--121-k8s-csi--node--driver--bw5cn-eth0" Dec 13 14:17:17.330298 env[1814]: 2024-12-13 14:17:17.270 [INFO][4545] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69" Namespace="calico-system" Pod="csi-node-driver-bw5cn" WorkloadEndpoint="ip--172--31--31--121-k8s-csi--node--driver--bw5cn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--121-k8s-csi--node--driver--bw5cn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cf1319c5-c836-4c8a-8002-1147cc1b3ed7", ResourceVersion:"764", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-121", ContainerID:"", Pod:"csi-node-driver-bw5cn", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.94.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali79b013e6e71", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:17.330298 env[1814]: 2024-12-13 14:17:17.270 [INFO][4545] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.94.67/32] ContainerID="e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69" Namespace="calico-system" Pod="csi-node-driver-bw5cn" WorkloadEndpoint="ip--172--31--31--121-k8s-csi--node--driver--bw5cn-eth0" Dec 13 14:17:17.330298 env[1814]: 2024-12-13 14:17:17.270 [INFO][4545] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali79b013e6e71 ContainerID="e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69" Namespace="calico-system" Pod="csi-node-driver-bw5cn" WorkloadEndpoint="ip--172--31--31--121-k8s-csi--node--driver--bw5cn-eth0" Dec 13 14:17:17.330298 env[1814]: 2024-12-13 14:17:17.284 [INFO][4545] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69" Namespace="calico-system" Pod="csi-node-driver-bw5cn" WorkloadEndpoint="ip--172--31--31--121-k8s-csi--node--driver--bw5cn-eth0" Dec 13 14:17:17.330298 env[1814]: 2024-12-13 14:17:17.288 [INFO][4545] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69" Namespace="calico-system" Pod="csi-node-driver-bw5cn" WorkloadEndpoint="ip--172--31--31--121-k8s-csi--node--driver--bw5cn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--121-k8s-csi--node--driver--bw5cn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cf1319c5-c836-4c8a-8002-1147cc1b3ed7", ResourceVersion:"764", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-121", ContainerID:"e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69", Pod:"csi-node-driver-bw5cn", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.94.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali79b013e6e71", MAC:"8a:49:b9:33:86:d1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:17.330298 env[1814]: 2024-12-13 14:17:17.323 [INFO][4545] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69" Namespace="calico-system" Pod="csi-node-driver-bw5cn" WorkloadEndpoint="ip--172--31--31--121-k8s-csi--node--driver--bw5cn-eth0" Dec 13 14:17:17.410878 env[1814]: time="2024-12-13T14:17:17.410727463Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:17:17.411078 env[1814]: time="2024-12-13T14:17:17.410903540Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:17:17.411078 env[1814]: time="2024-12-13T14:17:17.410991524Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:17:17.411650 env[1814]: time="2024-12-13T14:17:17.411538990Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69 pid=4580 runtime=io.containerd.runc.v2 Dec 13 14:17:17.491326 systemd[1]: Started cri-containerd-e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69.scope. Dec 13 14:17:17.523108 kernel: kauditd_printk_skb: 674 callbacks suppressed Dec 13 14:17:17.523273 kernel: audit: type=1325 audit(1734099437.513:1127): table=filter:103 family=2 entries=44 op=nft_register_chain pid=4599 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:17.513000 audit[4599]: NETFILTER_CFG table=filter:103 family=2 entries=44 op=nft_register_chain pid=4599 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:17.513000 audit[4599]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22680 a0=3 a1=ffffd1fd0be0 a2=0 a3=ffff8172bfa8 items=0 ppid=4133 pid=4599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:17.513000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:17.547971 kernel: audit: type=1300 audit(1734099437.513:1127): arch=c00000b7 syscall=211 success=yes exit=22680 a0=3 a1=ffffd1fd0be0 a2=0 a3=ffff8172bfa8 items=0 ppid=4133 pid=4599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:17.548194 kernel: audit: type=1327 audit(1734099437.513:1127): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:17.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.620833 kernel: audit: type=1400 audit(1734099437.603:1128): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.620978 kernel: audit: type=1400 audit(1734099437.603:1129): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.633255 kernel: audit: type=1400 audit(1734099437.603:1130): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.656172 kernel: audit: type=1400 audit(1734099437.603:1131): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.656345 kernel: audit: type=1400 audit(1734099437.603:1132): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.670726 env[1814]: time="2024-12-13T14:17:17.665010103Z" level=info msg="StopPodSandbox for \"d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9\"" Dec 13 14:17:17.679587 kernel: audit: type=1400 audit(1734099437.603:1133): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.679734 kernel: audit: type=1400 audit(1734099437.603:1134): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.684471 env[1814]: time="2024-12-13T14:17:17.684368046Z" level=info msg="StopPodSandbox for \"88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0\"" Dec 13 14:17:17.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.603000 audit: BPF prog-id=166 op=LOAD Dec 13 14:17:17.612000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.612000 audit[4589]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=4580 pid=4589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:17.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537373339613932393866626536353664616463393130623330333234 Dec 13 14:17:17.612000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.612000 audit[4589]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=4580 pid=4589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:17.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537373339613932393866626536353664616463393130623330333234 Dec 13 14:17:17.612000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.612000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.612000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.612000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.612000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.612000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.612000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.612000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.612000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.612000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.612000 audit: BPF prog-id=167 op=LOAD Dec 13 14:17:17.612000 audit[4589]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=4580 pid=4589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:17.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537373339613932393866626536353664616463393130623330333234 Dec 13 14:17:17.612000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.612000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.612000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.612000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.612000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.612000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.612000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.612000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.612000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.612000 audit: BPF prog-id=168 op=LOAD Dec 13 14:17:17.612000 audit[4589]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=4580 pid=4589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:17.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537373339613932393866626536353664616463393130623330333234 Dec 13 14:17:17.623000 audit: BPF prog-id=168 op=UNLOAD Dec 13 14:17:17.623000 audit: BPF prog-id=167 op=UNLOAD Dec 13 14:17:17.624000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.624000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.624000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.624000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.624000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.624000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.624000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.624000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.624000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.624000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:17.624000 audit: BPF prog-id=169 op=LOAD Dec 13 14:17:17.624000 audit[4589]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=4580 pid=4589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:17.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537373339613932393866626536353664616463393130623330333234 Dec 13 14:17:17.693392 env[1814]: time="2024-12-13T14:17:17.693317240Z" level=info msg="StopPodSandbox for \"b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954\"" Dec 13 14:17:17.741456 env[1814]: time="2024-12-13T14:17:17.741393416Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bw5cn,Uid:cf1319c5-c836-4c8a-8002-1147cc1b3ed7,Namespace:calico-system,Attempt:1,} returns sandbox id \"e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69\"" Dec 13 14:17:17.937487 systemd[1]: run-containerd-runc-k8s.io-e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69-runc.XzVmFz.mount: Deactivated successfully. Dec 13 14:17:18.128791 env[1814]: 2024-12-13 14:17:17.945 [INFO][4640] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" Dec 13 14:17:18.128791 env[1814]: 2024-12-13 14:17:17.945 [INFO][4640] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" iface="eth0" netns="/var/run/netns/cni-e6190b6d-b084-4b17-d7d6-8f5dcefeb124" Dec 13 14:17:18.128791 env[1814]: 2024-12-13 14:17:17.946 [INFO][4640] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" iface="eth0" netns="/var/run/netns/cni-e6190b6d-b084-4b17-d7d6-8f5dcefeb124" Dec 13 14:17:18.128791 env[1814]: 2024-12-13 14:17:17.947 [INFO][4640] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" iface="eth0" netns="/var/run/netns/cni-e6190b6d-b084-4b17-d7d6-8f5dcefeb124" Dec 13 14:17:18.128791 env[1814]: 2024-12-13 14:17:17.947 [INFO][4640] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" Dec 13 14:17:18.128791 env[1814]: 2024-12-13 14:17:17.947 [INFO][4640] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" Dec 13 14:17:18.128791 env[1814]: 2024-12-13 14:17:18.085 [INFO][4674] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" HandleID="k8s-pod-network.b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" Workload="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--ncfff-eth0" Dec 13 14:17:18.128791 env[1814]: 2024-12-13 14:17:18.086 [INFO][4674] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:18.128791 env[1814]: 2024-12-13 14:17:18.086 [INFO][4674] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:18.128791 env[1814]: 2024-12-13 14:17:18.100 [WARNING][4674] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" HandleID="k8s-pod-network.b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" Workload="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--ncfff-eth0" Dec 13 14:17:18.128791 env[1814]: 2024-12-13 14:17:18.100 [INFO][4674] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" HandleID="k8s-pod-network.b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" Workload="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--ncfff-eth0" Dec 13 14:17:18.128791 env[1814]: 2024-12-13 14:17:18.104 [INFO][4674] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:18.128791 env[1814]: 2024-12-13 14:17:18.116 [INFO][4640] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" Dec 13 14:17:18.137656 systemd[1]: run-netns-cni\x2de6190b6d\x2db084\x2d4b17\x2dd7d6\x2d8f5dcefeb124.mount: Deactivated successfully. Dec 13 14:17:18.139714 env[1814]: time="2024-12-13T14:17:18.138323765Z" level=info msg="TearDown network for sandbox \"b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954\" successfully" Dec 13 14:17:18.139714 env[1814]: time="2024-12-13T14:17:18.138742807Z" level=info msg="StopPodSandbox for \"b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954\" returns successfully" Dec 13 14:17:18.146021 env[1814]: time="2024-12-13T14:17:18.145962697Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67c8d7c486-ncfff,Uid:88fddb2e-ae6a-4869-a25b-6bff4dd7b4da,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:17:18.254875 env[1814]: 2024-12-13 14:17:18.001 [INFO][4659] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" Dec 13 14:17:18.254875 env[1814]: 2024-12-13 14:17:18.002 [INFO][4659] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" iface="eth0" netns="/var/run/netns/cni-21b5eaf6-1a47-501a-2953-b21396997a28" Dec 13 14:17:18.254875 env[1814]: 2024-12-13 14:17:18.002 [INFO][4659] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" iface="eth0" netns="/var/run/netns/cni-21b5eaf6-1a47-501a-2953-b21396997a28" Dec 13 14:17:18.254875 env[1814]: 2024-12-13 14:17:18.003 [INFO][4659] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" iface="eth0" netns="/var/run/netns/cni-21b5eaf6-1a47-501a-2953-b21396997a28" Dec 13 14:17:18.254875 env[1814]: 2024-12-13 14:17:18.003 [INFO][4659] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" Dec 13 14:17:18.254875 env[1814]: 2024-12-13 14:17:18.003 [INFO][4659] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" Dec 13 14:17:18.254875 env[1814]: 2024-12-13 14:17:18.217 [INFO][4680] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" HandleID="k8s-pod-network.d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" Workload="ip--172--31--31--121-k8s-coredns--6f6b679f8f--c65g5-eth0" Dec 13 14:17:18.254875 env[1814]: 2024-12-13 14:17:18.217 [INFO][4680] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:18.254875 env[1814]: 2024-12-13 14:17:18.218 [INFO][4680] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:18.254875 env[1814]: 2024-12-13 14:17:18.236 [WARNING][4680] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" HandleID="k8s-pod-network.d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" Workload="ip--172--31--31--121-k8s-coredns--6f6b679f8f--c65g5-eth0" Dec 13 14:17:18.254875 env[1814]: 2024-12-13 14:17:18.236 [INFO][4680] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" HandleID="k8s-pod-network.d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" Workload="ip--172--31--31--121-k8s-coredns--6f6b679f8f--c65g5-eth0" Dec 13 14:17:18.254875 env[1814]: 2024-12-13 14:17:18.239 [INFO][4680] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:18.254875 env[1814]: 2024-12-13 14:17:18.252 [INFO][4659] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" Dec 13 14:17:18.261824 systemd[1]: run-netns-cni\x2d21b5eaf6\x2d1a47\x2d501a\x2d2953\x2db21396997a28.mount: Deactivated successfully. Dec 13 14:17:18.264962 env[1814]: time="2024-12-13T14:17:18.264898054Z" level=info msg="TearDown network for sandbox \"d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9\" successfully" Dec 13 14:17:18.265255 env[1814]: time="2024-12-13T14:17:18.265205327Z" level=info msg="StopPodSandbox for \"d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9\" returns successfully" Dec 13 14:17:18.277229 env[1814]: time="2024-12-13T14:17:18.277157413Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-c65g5,Uid:a1601850-1168-45e1-aa6f-035031c5398b,Namespace:kube-system,Attempt:1,}" Dec 13 14:17:18.325022 env[1814]: 2024-12-13 14:17:18.043 [INFO][4668] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" Dec 13 14:17:18.325022 env[1814]: 2024-12-13 14:17:18.044 [INFO][4668] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" iface="eth0" netns="/var/run/netns/cni-072c9abd-05a4-cd90-b94a-50b932ba373b" Dec 13 14:17:18.325022 env[1814]: 2024-12-13 14:17:18.044 [INFO][4668] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" iface="eth0" netns="/var/run/netns/cni-072c9abd-05a4-cd90-b94a-50b932ba373b" Dec 13 14:17:18.325022 env[1814]: 2024-12-13 14:17:18.046 [INFO][4668] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" iface="eth0" netns="/var/run/netns/cni-072c9abd-05a4-cd90-b94a-50b932ba373b" Dec 13 14:17:18.325022 env[1814]: 2024-12-13 14:17:18.046 [INFO][4668] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" Dec 13 14:17:18.325022 env[1814]: 2024-12-13 14:17:18.046 [INFO][4668] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" Dec 13 14:17:18.325022 env[1814]: 2024-12-13 14:17:18.276 [INFO][4684] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" HandleID="k8s-pod-network.88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" Workload="ip--172--31--31--121-k8s-coredns--6f6b679f8f--4bslf-eth0" Dec 13 14:17:18.325022 env[1814]: 2024-12-13 14:17:18.282 [INFO][4684] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:18.325022 env[1814]: 2024-12-13 14:17:18.282 [INFO][4684] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:18.325022 env[1814]: 2024-12-13 14:17:18.304 [WARNING][4684] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" HandleID="k8s-pod-network.88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" Workload="ip--172--31--31--121-k8s-coredns--6f6b679f8f--4bslf-eth0" Dec 13 14:17:18.325022 env[1814]: 2024-12-13 14:17:18.304 [INFO][4684] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" HandleID="k8s-pod-network.88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" Workload="ip--172--31--31--121-k8s-coredns--6f6b679f8f--4bslf-eth0" Dec 13 14:17:18.325022 env[1814]: 2024-12-13 14:17:18.308 [INFO][4684] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:18.325022 env[1814]: 2024-12-13 14:17:18.321 [INFO][4668] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" Dec 13 14:17:18.326810 env[1814]: time="2024-12-13T14:17:18.325988667Z" level=info msg="TearDown network for sandbox \"88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0\" successfully" Dec 13 14:17:18.326810 env[1814]: time="2024-12-13T14:17:18.326172604Z" level=info msg="StopPodSandbox for \"88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0\" returns successfully" Dec 13 14:17:18.331912 env[1814]: time="2024-12-13T14:17:18.331830244Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-4bslf,Uid:6133c088-e43c-4c97-acbe-a9a4e6ca0a6d,Namespace:kube-system,Attempt:1,}" Dec 13 14:17:18.660633 systemd-networkd[1534]: cali79b013e6e71: Gained IPv6LL Dec 13 14:17:18.943397 systemd[1]: run-netns-cni\x2d072c9abd\x2d05a4\x2dcd90\x2db94a\x2d50b932ba373b.mount: Deactivated successfully. Dec 13 14:17:18.996673 systemd-networkd[1534]: cali5a2ce9bda3e: Link UP Dec 13 14:17:19.004381 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:17:19.004543 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5a2ce9bda3e: link becomes ready Dec 13 14:17:19.003867 systemd-networkd[1534]: cali5a2ce9bda3e: Gained carrier Dec 13 14:17:19.069476 env[1814]: 2024-12-13 14:17:18.407 [INFO][4693] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--ncfff-eth0 calico-apiserver-67c8d7c486- calico-apiserver 88fddb2e-ae6a-4869-a25b-6bff4dd7b4da 774 0 2024-12-13 14:16:46 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:67c8d7c486 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-31-121 calico-apiserver-67c8d7c486-ncfff eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali5a2ce9bda3e [] []}} ContainerID="41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db" Namespace="calico-apiserver" Pod="calico-apiserver-67c8d7c486-ncfff" WorkloadEndpoint="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--ncfff-" Dec 13 14:17:19.069476 env[1814]: 2024-12-13 14:17:18.408 [INFO][4693] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db" Namespace="calico-apiserver" Pod="calico-apiserver-67c8d7c486-ncfff" WorkloadEndpoint="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--ncfff-eth0" Dec 13 14:17:19.069476 env[1814]: 2024-12-13 14:17:18.778 [INFO][4728] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db" HandleID="k8s-pod-network.41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db" Workload="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--ncfff-eth0" Dec 13 14:17:19.069476 env[1814]: 2024-12-13 14:17:18.821 [INFO][4728] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db" HandleID="k8s-pod-network.41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db" Workload="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--ncfff-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400028c130), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-31-121", "pod":"calico-apiserver-67c8d7c486-ncfff", "timestamp":"2024-12-13 14:17:18.778029178 +0000 UTC"}, Hostname:"ip-172-31-31-121", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:17:19.069476 env[1814]: 2024-12-13 14:17:18.821 [INFO][4728] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:19.069476 env[1814]: 2024-12-13 14:17:18.821 [INFO][4728] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:19.069476 env[1814]: 2024-12-13 14:17:18.821 [INFO][4728] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-31-121' Dec 13 14:17:19.069476 env[1814]: 2024-12-13 14:17:18.837 [INFO][4728] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db" host="ip-172-31-31-121" Dec 13 14:17:19.069476 env[1814]: 2024-12-13 14:17:18.854 [INFO][4728] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-31-121" Dec 13 14:17:19.069476 env[1814]: 2024-12-13 14:17:18.875 [INFO][4728] ipam/ipam.go 489: Trying affinity for 192.168.94.64/26 host="ip-172-31-31-121" Dec 13 14:17:19.069476 env[1814]: 2024-12-13 14:17:18.886 [INFO][4728] ipam/ipam.go 155: Attempting to load block cidr=192.168.94.64/26 host="ip-172-31-31-121" Dec 13 14:17:19.069476 env[1814]: 2024-12-13 14:17:18.892 [INFO][4728] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.94.64/26 host="ip-172-31-31-121" Dec 13 14:17:19.069476 env[1814]: 2024-12-13 14:17:18.892 [INFO][4728] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.94.64/26 handle="k8s-pod-network.41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db" host="ip-172-31-31-121" Dec 13 14:17:19.069476 env[1814]: 2024-12-13 14:17:18.897 [INFO][4728] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db Dec 13 14:17:19.069476 env[1814]: 2024-12-13 14:17:18.914 [INFO][4728] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.94.64/26 handle="k8s-pod-network.41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db" host="ip-172-31-31-121" Dec 13 14:17:19.069476 env[1814]: 2024-12-13 14:17:18.945 [INFO][4728] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.94.68/26] block=192.168.94.64/26 handle="k8s-pod-network.41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db" host="ip-172-31-31-121" Dec 13 14:17:19.069476 env[1814]: 2024-12-13 14:17:18.945 [INFO][4728] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.94.68/26] handle="k8s-pod-network.41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db" host="ip-172-31-31-121" Dec 13 14:17:19.069476 env[1814]: 2024-12-13 14:17:18.945 [INFO][4728] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:19.069476 env[1814]: 2024-12-13 14:17:18.945 [INFO][4728] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.94.68/26] IPv6=[] ContainerID="41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db" HandleID="k8s-pod-network.41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db" Workload="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--ncfff-eth0" Dec 13 14:17:19.071358 env[1814]: 2024-12-13 14:17:18.964 [INFO][4693] cni-plugin/k8s.go 386: Populated endpoint ContainerID="41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db" Namespace="calico-apiserver" Pod="calico-apiserver-67c8d7c486-ncfff" WorkloadEndpoint="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--ncfff-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--ncfff-eth0", GenerateName:"calico-apiserver-67c8d7c486-", Namespace:"calico-apiserver", SelfLink:"", UID:"88fddb2e-ae6a-4869-a25b-6bff4dd7b4da", ResourceVersion:"774", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67c8d7c486", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-121", ContainerID:"", Pod:"calico-apiserver-67c8d7c486-ncfff", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.94.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5a2ce9bda3e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:19.071358 env[1814]: 2024-12-13 14:17:18.966 [INFO][4693] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.94.68/32] ContainerID="41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db" Namespace="calico-apiserver" Pod="calico-apiserver-67c8d7c486-ncfff" WorkloadEndpoint="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--ncfff-eth0" Dec 13 14:17:19.071358 env[1814]: 2024-12-13 14:17:18.966 [INFO][4693] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5a2ce9bda3e ContainerID="41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db" Namespace="calico-apiserver" Pod="calico-apiserver-67c8d7c486-ncfff" WorkloadEndpoint="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--ncfff-eth0" Dec 13 14:17:19.071358 env[1814]: 2024-12-13 14:17:19.025 [INFO][4693] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db" Namespace="calico-apiserver" Pod="calico-apiserver-67c8d7c486-ncfff" WorkloadEndpoint="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--ncfff-eth0" Dec 13 14:17:19.071358 env[1814]: 2024-12-13 14:17:19.026 [INFO][4693] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db" Namespace="calico-apiserver" Pod="calico-apiserver-67c8d7c486-ncfff" WorkloadEndpoint="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--ncfff-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--ncfff-eth0", GenerateName:"calico-apiserver-67c8d7c486-", Namespace:"calico-apiserver", SelfLink:"", UID:"88fddb2e-ae6a-4869-a25b-6bff4dd7b4da", ResourceVersion:"774", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67c8d7c486", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-121", ContainerID:"41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db", Pod:"calico-apiserver-67c8d7c486-ncfff", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.94.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5a2ce9bda3e", MAC:"8a:cf:a5:38:24:db", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:19.071358 env[1814]: 2024-12-13 14:17:19.052 [INFO][4693] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db" Namespace="calico-apiserver" Pod="calico-apiserver-67c8d7c486-ncfff" WorkloadEndpoint="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--ncfff-eth0" Dec 13 14:17:19.101920 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibe6a33d8242: link becomes ready Dec 13 14:17:19.101310 systemd-networkd[1534]: calibe6a33d8242: Link UP Dec 13 14:17:19.101705 systemd-networkd[1534]: calibe6a33d8242: Gained carrier Dec 13 14:17:19.172913 env[1814]: 2024-12-13 14:17:18.544 [INFO][4705] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--31--121-k8s-coredns--6f6b679f8f--c65g5-eth0 coredns-6f6b679f8f- kube-system a1601850-1168-45e1-aa6f-035031c5398b 775 0 2024-12-13 14:16:37 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-31-121 coredns-6f6b679f8f-c65g5 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calibe6a33d8242 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200" Namespace="kube-system" Pod="coredns-6f6b679f8f-c65g5" WorkloadEndpoint="ip--172--31--31--121-k8s-coredns--6f6b679f8f--c65g5-" Dec 13 14:17:19.172913 env[1814]: 2024-12-13 14:17:18.545 [INFO][4705] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200" Namespace="kube-system" Pod="coredns-6f6b679f8f-c65g5" WorkloadEndpoint="ip--172--31--31--121-k8s-coredns--6f6b679f8f--c65g5-eth0" Dec 13 14:17:19.172913 env[1814]: 2024-12-13 14:17:18.800 [INFO][4733] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200" HandleID="k8s-pod-network.da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200" Workload="ip--172--31--31--121-k8s-coredns--6f6b679f8f--c65g5-eth0" Dec 13 14:17:19.172913 env[1814]: 2024-12-13 14:17:18.842 [INFO][4733] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200" HandleID="k8s-pod-network.da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200" Workload="ip--172--31--31--121-k8s-coredns--6f6b679f8f--c65g5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003108d0), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-31-121", "pod":"coredns-6f6b679f8f-c65g5", "timestamp":"2024-12-13 14:17:18.800797618 +0000 UTC"}, Hostname:"ip-172-31-31-121", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:17:19.172913 env[1814]: 2024-12-13 14:17:18.843 [INFO][4733] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:19.172913 env[1814]: 2024-12-13 14:17:18.947 [INFO][4733] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:19.172913 env[1814]: 2024-12-13 14:17:18.947 [INFO][4733] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-31-121' Dec 13 14:17:19.172913 env[1814]: 2024-12-13 14:17:18.976 [INFO][4733] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200" host="ip-172-31-31-121" Dec 13 14:17:19.172913 env[1814]: 2024-12-13 14:17:19.005 [INFO][4733] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-31-121" Dec 13 14:17:19.172913 env[1814]: 2024-12-13 14:17:19.026 [INFO][4733] ipam/ipam.go 489: Trying affinity for 192.168.94.64/26 host="ip-172-31-31-121" Dec 13 14:17:19.172913 env[1814]: 2024-12-13 14:17:19.038 [INFO][4733] ipam/ipam.go 155: Attempting to load block cidr=192.168.94.64/26 host="ip-172-31-31-121" Dec 13 14:17:19.172913 env[1814]: 2024-12-13 14:17:19.045 [INFO][4733] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.94.64/26 host="ip-172-31-31-121" Dec 13 14:17:19.172913 env[1814]: 2024-12-13 14:17:19.045 [INFO][4733] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.94.64/26 handle="k8s-pod-network.da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200" host="ip-172-31-31-121" Dec 13 14:17:19.172913 env[1814]: 2024-12-13 14:17:19.050 [INFO][4733] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200 Dec 13 14:17:19.172913 env[1814]: 2024-12-13 14:17:19.065 [INFO][4733] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.94.64/26 handle="k8s-pod-network.da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200" host="ip-172-31-31-121" Dec 13 14:17:19.172913 env[1814]: 2024-12-13 14:17:19.085 [INFO][4733] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.94.69/26] block=192.168.94.64/26 handle="k8s-pod-network.da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200" host="ip-172-31-31-121" Dec 13 14:17:19.172913 env[1814]: 2024-12-13 14:17:19.086 [INFO][4733] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.94.69/26] handle="k8s-pod-network.da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200" host="ip-172-31-31-121" Dec 13 14:17:19.172913 env[1814]: 2024-12-13 14:17:19.086 [INFO][4733] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:19.172913 env[1814]: 2024-12-13 14:17:19.086 [INFO][4733] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.94.69/26] IPv6=[] ContainerID="da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200" HandleID="k8s-pod-network.da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200" Workload="ip--172--31--31--121-k8s-coredns--6f6b679f8f--c65g5-eth0" Dec 13 14:17:19.175922 env[1814]: 2024-12-13 14:17:19.091 [INFO][4705] cni-plugin/k8s.go 386: Populated endpoint ContainerID="da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200" Namespace="kube-system" Pod="coredns-6f6b679f8f-c65g5" WorkloadEndpoint="ip--172--31--31--121-k8s-coredns--6f6b679f8f--c65g5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--121-k8s-coredns--6f6b679f8f--c65g5-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"a1601850-1168-45e1-aa6f-035031c5398b", ResourceVersion:"775", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-121", ContainerID:"", Pod:"coredns-6f6b679f8f-c65g5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.94.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibe6a33d8242", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:19.175922 env[1814]: 2024-12-13 14:17:19.092 [INFO][4705] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.94.69/32] ContainerID="da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200" Namespace="kube-system" Pod="coredns-6f6b679f8f-c65g5" WorkloadEndpoint="ip--172--31--31--121-k8s-coredns--6f6b679f8f--c65g5-eth0" Dec 13 14:17:19.175922 env[1814]: 2024-12-13 14:17:19.092 [INFO][4705] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calibe6a33d8242 ContainerID="da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200" Namespace="kube-system" Pod="coredns-6f6b679f8f-c65g5" WorkloadEndpoint="ip--172--31--31--121-k8s-coredns--6f6b679f8f--c65g5-eth0" Dec 13 14:17:19.175922 env[1814]: 2024-12-13 14:17:19.103 [INFO][4705] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200" Namespace="kube-system" Pod="coredns-6f6b679f8f-c65g5" WorkloadEndpoint="ip--172--31--31--121-k8s-coredns--6f6b679f8f--c65g5-eth0" Dec 13 14:17:19.175922 env[1814]: 2024-12-13 14:17:19.103 [INFO][4705] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200" Namespace="kube-system" Pod="coredns-6f6b679f8f-c65g5" WorkloadEndpoint="ip--172--31--31--121-k8s-coredns--6f6b679f8f--c65g5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--121-k8s-coredns--6f6b679f8f--c65g5-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"a1601850-1168-45e1-aa6f-035031c5398b", ResourceVersion:"775", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-121", ContainerID:"da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200", Pod:"coredns-6f6b679f8f-c65g5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.94.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibe6a33d8242", MAC:"92:20:be:6d:25:19", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:19.175922 env[1814]: 2024-12-13 14:17:19.166 [INFO][4705] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200" Namespace="kube-system" Pod="coredns-6f6b679f8f-c65g5" WorkloadEndpoint="ip--172--31--31--121-k8s-coredns--6f6b679f8f--c65g5-eth0" Dec 13 14:17:19.197625 env[1814]: time="2024-12-13T14:17:19.196358983Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:17:19.197625 env[1814]: time="2024-12-13T14:17:19.196427552Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:17:19.197625 env[1814]: time="2024-12-13T14:17:19.196453820Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:17:19.197625 env[1814]: time="2024-12-13T14:17:19.196719093Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db pid=4776 runtime=io.containerd.runc.v2 Dec 13 14:17:19.209000 audit[4771]: NETFILTER_CFG table=filter:104 family=2 entries=44 op=nft_register_chain pid=4771 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:19.209000 audit[4771]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24352 a0=3 a1=fffff1de13c0 a2=0 a3=ffffb9c4cfa8 items=0 ppid=4133 pid=4771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.209000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:19.293548 systemd-networkd[1534]: calic2011824c8e: Link UP Dec 13 14:17:19.304479 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic2011824c8e: link becomes ready Dec 13 14:17:19.306530 systemd-networkd[1534]: calic2011824c8e: Gained carrier Dec 13 14:17:19.320970 amazon-ssm-agent[1790]: 2024-12-13 14:17:19 INFO [HealthCheck] HealthCheck reporting agent health. Dec 13 14:17:19.329377 systemd[1]: Started cri-containerd-41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db.scope. Dec 13 14:17:19.370785 systemd[1]: run-containerd-runc-k8s.io-41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db-runc.H4ht6i.mount: Deactivated successfully. Dec 13 14:17:19.386192 env[1814]: 2024-12-13 14:17:18.766 [INFO][4719] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--31--121-k8s-coredns--6f6b679f8f--4bslf-eth0 coredns-6f6b679f8f- kube-system 6133c088-e43c-4c97-acbe-a9a4e6ca0a6d 776 0 2024-12-13 14:16:37 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-31-121 coredns-6f6b679f8f-4bslf eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calic2011824c8e [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268" Namespace="kube-system" Pod="coredns-6f6b679f8f-4bslf" WorkloadEndpoint="ip--172--31--31--121-k8s-coredns--6f6b679f8f--4bslf-" Dec 13 14:17:19.386192 env[1814]: 2024-12-13 14:17:18.767 [INFO][4719] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268" Namespace="kube-system" Pod="coredns-6f6b679f8f-4bslf" WorkloadEndpoint="ip--172--31--31--121-k8s-coredns--6f6b679f8f--4bslf-eth0" Dec 13 14:17:19.386192 env[1814]: 2024-12-13 14:17:18.927 [INFO][4742] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268" HandleID="k8s-pod-network.d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268" Workload="ip--172--31--31--121-k8s-coredns--6f6b679f8f--4bslf-eth0" Dec 13 14:17:19.386192 env[1814]: 2024-12-13 14:17:19.010 [INFO][4742] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268" HandleID="k8s-pod-network.d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268" Workload="ip--172--31--31--121-k8s-coredns--6f6b679f8f--4bslf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400038f3a0), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-31-121", "pod":"coredns-6f6b679f8f-4bslf", "timestamp":"2024-12-13 14:17:18.927618051 +0000 UTC"}, Hostname:"ip-172-31-31-121", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:17:19.386192 env[1814]: 2024-12-13 14:17:19.010 [INFO][4742] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:19.386192 env[1814]: 2024-12-13 14:17:19.086 [INFO][4742] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:19.386192 env[1814]: 2024-12-13 14:17:19.086 [INFO][4742] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-31-121' Dec 13 14:17:19.386192 env[1814]: 2024-12-13 14:17:19.124 [INFO][4742] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268" host="ip-172-31-31-121" Dec 13 14:17:19.386192 env[1814]: 2024-12-13 14:17:19.157 [INFO][4742] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-31-121" Dec 13 14:17:19.386192 env[1814]: 2024-12-13 14:17:19.182 [INFO][4742] ipam/ipam.go 489: Trying affinity for 192.168.94.64/26 host="ip-172-31-31-121" Dec 13 14:17:19.386192 env[1814]: 2024-12-13 14:17:19.186 [INFO][4742] ipam/ipam.go 155: Attempting to load block cidr=192.168.94.64/26 host="ip-172-31-31-121" Dec 13 14:17:19.386192 env[1814]: 2024-12-13 14:17:19.203 [INFO][4742] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.94.64/26 host="ip-172-31-31-121" Dec 13 14:17:19.386192 env[1814]: 2024-12-13 14:17:19.203 [INFO][4742] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.94.64/26 handle="k8s-pod-network.d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268" host="ip-172-31-31-121" Dec 13 14:17:19.386192 env[1814]: 2024-12-13 14:17:19.219 [INFO][4742] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268 Dec 13 14:17:19.386192 env[1814]: 2024-12-13 14:17:19.237 [INFO][4742] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.94.64/26 handle="k8s-pod-network.d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268" host="ip-172-31-31-121" Dec 13 14:17:19.386192 env[1814]: 2024-12-13 14:17:19.262 [INFO][4742] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.94.70/26] block=192.168.94.64/26 handle="k8s-pod-network.d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268" host="ip-172-31-31-121" Dec 13 14:17:19.386192 env[1814]: 2024-12-13 14:17:19.262 [INFO][4742] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.94.70/26] handle="k8s-pod-network.d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268" host="ip-172-31-31-121" Dec 13 14:17:19.386192 env[1814]: 2024-12-13 14:17:19.262 [INFO][4742] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:19.386192 env[1814]: 2024-12-13 14:17:19.262 [INFO][4742] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.94.70/26] IPv6=[] ContainerID="d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268" HandleID="k8s-pod-network.d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268" Workload="ip--172--31--31--121-k8s-coredns--6f6b679f8f--4bslf-eth0" Dec 13 14:17:19.387582 env[1814]: 2024-12-13 14:17:19.272 [INFO][4719] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268" Namespace="kube-system" Pod="coredns-6f6b679f8f-4bslf" WorkloadEndpoint="ip--172--31--31--121-k8s-coredns--6f6b679f8f--4bslf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--121-k8s-coredns--6f6b679f8f--4bslf-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"6133c088-e43c-4c97-acbe-a9a4e6ca0a6d", ResourceVersion:"776", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-121", ContainerID:"", Pod:"coredns-6f6b679f8f-4bslf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.94.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic2011824c8e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:19.387582 env[1814]: 2024-12-13 14:17:19.272 [INFO][4719] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.94.70/32] ContainerID="d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268" Namespace="kube-system" Pod="coredns-6f6b679f8f-4bslf" WorkloadEndpoint="ip--172--31--31--121-k8s-coredns--6f6b679f8f--4bslf-eth0" Dec 13 14:17:19.387582 env[1814]: 2024-12-13 14:17:19.272 [INFO][4719] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic2011824c8e ContainerID="d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268" Namespace="kube-system" Pod="coredns-6f6b679f8f-4bslf" WorkloadEndpoint="ip--172--31--31--121-k8s-coredns--6f6b679f8f--4bslf-eth0" Dec 13 14:17:19.387582 env[1814]: 2024-12-13 14:17:19.311 [INFO][4719] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268" Namespace="kube-system" Pod="coredns-6f6b679f8f-4bslf" WorkloadEndpoint="ip--172--31--31--121-k8s-coredns--6f6b679f8f--4bslf-eth0" Dec 13 14:17:19.387582 env[1814]: 2024-12-13 14:17:19.320 [INFO][4719] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268" Namespace="kube-system" Pod="coredns-6f6b679f8f-4bslf" WorkloadEndpoint="ip--172--31--31--121-k8s-coredns--6f6b679f8f--4bslf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--121-k8s-coredns--6f6b679f8f--4bslf-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"6133c088-e43c-4c97-acbe-a9a4e6ca0a6d", ResourceVersion:"776", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-121", ContainerID:"d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268", Pod:"coredns-6f6b679f8f-4bslf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.94.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic2011824c8e", MAC:"2e:69:cd:6e:5e:b1", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:19.387582 env[1814]: 2024-12-13 14:17:19.359 [INFO][4719] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268" Namespace="kube-system" Pod="coredns-6f6b679f8f-4bslf" WorkloadEndpoint="ip--172--31--31--121-k8s-coredns--6f6b679f8f--4bslf-eth0" Dec 13 14:17:19.409000 audit[4815]: NETFILTER_CFG table=filter:105 family=2 entries=42 op=nft_register_chain pid=4815 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:19.409000 audit[4815]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21492 a0=3 a1=ffffe08c6b30 a2=0 a3=ffffbb160fa8 items=0 ppid=4133 pid=4815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.409000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:19.415581 env[1814]: time="2024-12-13T14:17:19.400653116Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:17:19.415581 env[1814]: time="2024-12-13T14:17:19.400723376Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:17:19.415581 env[1814]: time="2024-12-13T14:17:19.400749224Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:17:19.415581 env[1814]: time="2024-12-13T14:17:19.401001585Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200 pid=4821 runtime=io.containerd.runc.v2 Dec 13 14:17:19.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.501000 audit: BPF prog-id=170 op=LOAD Dec 13 14:17:19.505000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.505000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4776 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431636337616566633536373130626136306131363363616639633738 Dec 13 14:17:19.507000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.507000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4776 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431636337616566633536373130626136306131363363616639633738 Dec 13 14:17:19.507000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.507000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.507000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.507000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.507000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.507000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.507000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.507000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.507000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.507000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.507000 audit: BPF prog-id=171 op=LOAD Dec 13 14:17:19.507000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4776 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431636337616566633536373130626136306131363363616639633738 Dec 13 14:17:19.510000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.510000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.510000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.510000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.510000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.510000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.510000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.510000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.510000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.510000 audit: BPF prog-id=172 op=LOAD Dec 13 14:17:19.510000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4776 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431636337616566633536373130626136306131363363616639633738 Dec 13 14:17:19.513000 audit: BPF prog-id=172 op=UNLOAD Dec 13 14:17:19.513000 audit: BPF prog-id=171 op=UNLOAD Dec 13 14:17:19.514000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.514000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.514000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.514000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.514000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.514000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.514000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.514000 audit[4796]: AVC avc: denied { perfmon } for pid=4796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.514000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.514000 audit[4796]: AVC avc: denied { bpf } for pid=4796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.514000 audit: BPF prog-id=173 op=LOAD Dec 13 14:17:19.514000 audit[4796]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4776 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431636337616566633536373130626136306131363363616639633738 Dec 13 14:17:19.523000 audit[4848]: NETFILTER_CFG table=filter:106 family=2 entries=38 op=nft_register_chain pid=4848 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:17:19.523000 audit[4848]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19376 a0=3 a1=ffffc2957130 a2=0 a3=ffff7fb83fa8 items=0 ppid=4133 pid=4848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.523000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:17:19.525929 env[1814]: time="2024-12-13T14:17:19.521922213Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:17:19.525929 env[1814]: time="2024-12-13T14:17:19.522079630Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:17:19.525929 env[1814]: time="2024-12-13T14:17:19.522171538Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:17:19.530477 env[1814]: time="2024-12-13T14:17:19.526649489Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268 pid=4858 runtime=io.containerd.runc.v2 Dec 13 14:17:19.546631 systemd[1]: Started cri-containerd-da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200.scope. Dec 13 14:17:19.574465 systemd[1]: Started cri-containerd-d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268.scope. Dec 13 14:17:19.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.700000 audit: BPF prog-id=174 op=LOAD Dec 13 14:17:19.701000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.701000 audit[4840]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4821 pid=4840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461303832363062613531363330303363323639653265633636333433 Dec 13 14:17:19.701000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.701000 audit[4840]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4821 pid=4840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461303832363062613531363330303363323639653265633636333433 Dec 13 14:17:19.701000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.701000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.701000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.701000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.701000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.701000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.701000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.701000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.701000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.701000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.701000 audit: BPF prog-id=175 op=LOAD Dec 13 14:17:19.701000 audit[4840]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4821 pid=4840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461303832363062613531363330303363323639653265633636333433 Dec 13 14:17:19.701000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.701000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.701000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.701000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.701000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.701000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.701000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.701000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.701000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.701000 audit: BPF prog-id=176 op=LOAD Dec 13 14:17:19.701000 audit[4840]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4821 pid=4840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461303832363062613531363330303363323639653265633636333433 Dec 13 14:17:19.702000 audit: BPF prog-id=176 op=UNLOAD Dec 13 14:17:19.702000 audit: BPF prog-id=175 op=UNLOAD Dec 13 14:17:19.702000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.702000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.702000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.702000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.702000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.702000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.702000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.702000 audit[4840]: AVC avc: denied { perfmon } for pid=4840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.702000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.702000 audit[4840]: AVC avc: denied { bpf } for pid=4840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.702000 audit: BPF prog-id=177 op=LOAD Dec 13 14:17:19.702000 audit[4840]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4821 pid=4840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461303832363062613531363330303363323639653265633636333433 Dec 13 14:17:19.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.722000 audit: BPF prog-id=178 op=LOAD Dec 13 14:17:19.724000 audit[4872]: AVC avc: denied { bpf } for pid=4872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.724000 audit[4872]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4858 pid=4872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432303563323430376463336236623538646664376533643737633566 Dec 13 14:17:19.726000 audit[4872]: AVC avc: denied { perfmon } for pid=4872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.726000 audit[4872]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4858 pid=4872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432303563323430376463336236623538646664376533643737633566 Dec 13 14:17:19.727000 audit[4872]: AVC avc: denied { bpf } for pid=4872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.727000 audit[4872]: AVC avc: denied { bpf } for pid=4872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.727000 audit[4872]: AVC avc: denied { bpf } for pid=4872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.727000 audit[4872]: AVC avc: denied { perfmon } for pid=4872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.727000 audit[4872]: AVC avc: denied { perfmon } for pid=4872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.727000 audit[4872]: AVC avc: denied { perfmon } for pid=4872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.727000 audit[4872]: AVC avc: denied { perfmon } for pid=4872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.727000 audit[4872]: AVC avc: denied { perfmon } for pid=4872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.727000 audit[4872]: AVC avc: denied { bpf } for pid=4872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.727000 audit[4872]: AVC avc: denied { bpf } for pid=4872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.727000 audit: BPF prog-id=179 op=LOAD Dec 13 14:17:19.727000 audit[4872]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4858 pid=4872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432303563323430376463336236623538646664376533643737633566 Dec 13 14:17:19.734000 audit[4872]: AVC avc: denied { bpf } for pid=4872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.734000 audit[4872]: AVC avc: denied { bpf } for pid=4872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.734000 audit[4872]: AVC avc: denied { perfmon } for pid=4872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.734000 audit[4872]: AVC avc: denied { perfmon } for pid=4872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.734000 audit[4872]: AVC avc: denied { perfmon } for pid=4872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.734000 audit[4872]: AVC avc: denied { perfmon } for pid=4872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.734000 audit[4872]: AVC avc: denied { perfmon } for pid=4872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.734000 audit[4872]: AVC avc: denied { bpf } for pid=4872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.734000 audit[4872]: AVC avc: denied { bpf } for pid=4872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.734000 audit: BPF prog-id=180 op=LOAD Dec 13 14:17:19.734000 audit[4872]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4858 pid=4872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432303563323430376463336236623538646664376533643737633566 Dec 13 14:17:19.737000 audit: BPF prog-id=180 op=UNLOAD Dec 13 14:17:19.737000 audit: BPF prog-id=179 op=UNLOAD Dec 13 14:17:19.737000 audit[4872]: AVC avc: denied { bpf } for pid=4872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.737000 audit[4872]: AVC avc: denied { bpf } for pid=4872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.737000 audit[4872]: AVC avc: denied { bpf } for pid=4872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.737000 audit[4872]: AVC avc: denied { perfmon } for pid=4872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.737000 audit[4872]: AVC avc: denied { perfmon } for pid=4872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.737000 audit[4872]: AVC avc: denied { perfmon } for pid=4872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.737000 audit[4872]: AVC avc: denied { perfmon } for pid=4872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.737000 audit[4872]: AVC avc: denied { perfmon } for pid=4872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.737000 audit[4872]: AVC avc: denied { bpf } for pid=4872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.737000 audit[4872]: AVC avc: denied { bpf } for pid=4872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.737000 audit: BPF prog-id=181 op=LOAD Dec 13 14:17:19.737000 audit[4872]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4858 pid=4872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432303563323430376463336236623538646664376533643737633566 Dec 13 14:17:19.809433 env[1814]: time="2024-12-13T14:17:19.809352537Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67c8d7c486-ncfff,Uid:88fddb2e-ae6a-4869-a25b-6bff4dd7b4da,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db\"" Dec 13 14:17:19.856059 env[1814]: time="2024-12-13T14:17:19.855984599Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-c65g5,Uid:a1601850-1168-45e1-aa6f-035031c5398b,Namespace:kube-system,Attempt:1,} returns sandbox id \"da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200\"" Dec 13 14:17:19.869774 env[1814]: time="2024-12-13T14:17:19.869682572Z" level=info msg="CreateContainer within sandbox \"da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:17:19.925048 env[1814]: time="2024-12-13T14:17:19.924954431Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-4bslf,Uid:6133c088-e43c-4c97-acbe-a9a4e6ca0a6d,Namespace:kube-system,Attempt:1,} returns sandbox id \"d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268\"" Dec 13 14:17:19.942405 env[1814]: time="2024-12-13T14:17:19.942332159Z" level=info msg="CreateContainer within sandbox \"d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:17:19.953338 env[1814]: time="2024-12-13T14:17:19.953271909Z" level=info msg="CreateContainer within sandbox \"da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"74a6fd6ff307bcfe968eefc98aff6f09345de1b155da43edf0a31d8e34992db4\"" Dec 13 14:17:19.954285 env[1814]: time="2024-12-13T14:17:19.954223861Z" level=info msg="StartContainer for \"74a6fd6ff307bcfe968eefc98aff6f09345de1b155da43edf0a31d8e34992db4\"" Dec 13 14:17:20.042434 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1112156345.mount: Deactivated successfully. Dec 13 14:17:20.066214 env[1814]: time="2024-12-13T14:17:20.063111941Z" level=info msg="CreateContainer within sandbox \"d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"914e8d3dc29773c4ceec6aa497c81694bcc1cdd834f0c1ed74c6f8b71d8b2093\"" Dec 13 14:17:20.068717 env[1814]: time="2024-12-13T14:17:20.068611012Z" level=info msg="StartContainer for \"914e8d3dc29773c4ceec6aa497c81694bcc1cdd834f0c1ed74c6f8b71d8b2093\"" Dec 13 14:17:20.112807 systemd[1]: Started cri-containerd-74a6fd6ff307bcfe968eefc98aff6f09345de1b155da43edf0a31d8e34992db4.scope. Dec 13 14:17:20.130479 systemd-networkd[1534]: cali5a2ce9bda3e: Gained IPv6LL Dec 13 14:17:20.168412 env[1814]: time="2024-12-13T14:17:20.168331856Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:20.173054 env[1814]: time="2024-12-13T14:17:20.172975899Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:20.177735 env[1814]: time="2024-12-13T14:17:20.177660563Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:20.186065 env[1814]: time="2024-12-13T14:17:20.183629075Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:20.186065 env[1814]: time="2024-12-13T14:17:20.184585743Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c\"" Dec 13 14:17:20.194692 systemd[1]: Started cri-containerd-914e8d3dc29773c4ceec6aa497c81694bcc1cdd834f0c1ed74c6f8b71d8b2093.scope. Dec 13 14:17:20.198414 env[1814]: time="2024-12-13T14:17:20.192922994Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 14:17:20.206131 env[1814]: time="2024-12-13T14:17:20.206031440Z" level=info msg="CreateContainer within sandbox \"ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:17:20.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.208000 audit: BPF prog-id=182 op=LOAD Dec 13 14:17:20.223000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.223000 audit[4949]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4821 pid=4949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734613666643666663330376263666539363865656663393861666636 Dec 13 14:17:20.223000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.223000 audit[4949]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4821 pid=4949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734613666643666663330376263666539363865656663393861666636 Dec 13 14:17:20.223000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.223000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.223000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.223000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.223000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.223000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.223000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.223000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.223000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.223000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.223000 audit: BPF prog-id=183 op=LOAD Dec 13 14:17:20.223000 audit[4949]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4821 pid=4949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734613666643666663330376263666539363865656663393861666636 Dec 13 14:17:20.224000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.224000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.224000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.224000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.224000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.224000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.224000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.224000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.224000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.224000 audit: BPF prog-id=184 op=LOAD Dec 13 14:17:20.224000 audit[4949]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4821 pid=4949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734613666643666663330376263666539363865656663393861666636 Dec 13 14:17:20.224000 audit: BPF prog-id=184 op=UNLOAD Dec 13 14:17:20.224000 audit: BPF prog-id=183 op=UNLOAD Dec 13 14:17:20.224000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.224000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.224000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.224000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.224000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.224000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.224000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.224000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.224000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.224000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.224000 audit: BPF prog-id=185 op=LOAD Dec 13 14:17:20.224000 audit[4949]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4821 pid=4949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734613666643666663330376263666539363865656663393861666636 Dec 13 14:17:20.280896 env[1814]: time="2024-12-13T14:17:20.280781057Z" level=info msg="CreateContainer within sandbox \"ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"8b652c758ddf7cf7730e7b5c08d025079c7cb9908e9e7bc0c2df68e755e1cd96\"" Dec 13 14:17:20.283259 env[1814]: time="2024-12-13T14:17:20.282155903Z" level=info msg="StartContainer for \"8b652c758ddf7cf7730e7b5c08d025079c7cb9908e9e7bc0c2df68e755e1cd96\"" Dec 13 14:17:20.308088 env[1814]: time="2024-12-13T14:17:20.308020078Z" level=info msg="StartContainer for \"74a6fd6ff307bcfe968eefc98aff6f09345de1b155da43edf0a31d8e34992db4\" returns successfully" Dec 13 14:17:20.322498 systemd-networkd[1534]: calibe6a33d8242: Gained IPv6LL Dec 13 14:17:20.359376 systemd[1]: Started cri-containerd-8b652c758ddf7cf7730e7b5c08d025079c7cb9908e9e7bc0c2df68e755e1cd96.scope. Dec 13 14:17:20.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.369000 audit: BPF prog-id=186 op=LOAD Dec 13 14:17:20.370000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.370000 audit[4967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4858 pid=4967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931346538643364633239373733633463656563366161343937633831 Dec 13 14:17:20.370000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.370000 audit[4967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4858 pid=4967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931346538643364633239373733633463656563366161343937633831 Dec 13 14:17:20.374000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.374000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.374000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.374000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.374000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.374000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.374000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.374000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.374000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.374000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.374000 audit: BPF prog-id=187 op=LOAD Dec 13 14:17:20.374000 audit[4967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4858 pid=4967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931346538643364633239373733633463656563366161343937633831 Dec 13 14:17:20.376000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.376000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.376000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.376000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.376000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.376000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.376000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.376000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.376000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.376000 audit: BPF prog-id=188 op=LOAD Dec 13 14:17:20.376000 audit[4967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4858 pid=4967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931346538643364633239373733633463656563366161343937633831 Dec 13 14:17:20.377000 audit: BPF prog-id=188 op=UNLOAD Dec 13 14:17:20.378000 audit: BPF prog-id=187 op=UNLOAD Dec 13 14:17:20.378000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.378000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.378000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.378000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.378000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.378000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.378000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.378000 audit[4967]: AVC avc: denied { perfmon } for pid=4967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.378000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.378000 audit[4967]: AVC avc: denied { bpf } for pid=4967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.378000 audit: BPF prog-id=189 op=LOAD Dec 13 14:17:20.378000 audit[4967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4858 pid=4967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931346538643364633239373733633463656563366161343937633831 Dec 13 14:17:20.450383 env[1814]: time="2024-12-13T14:17:20.450284219Z" level=info msg="StartContainer for \"914e8d3dc29773c4ceec6aa497c81694bcc1cdd834f0c1ed74c6f8b71d8b2093\" returns successfully" Dec 13 14:17:20.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.531000 audit: BPF prog-id=190 op=LOAD Dec 13 14:17:20.533000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.533000 audit[5001]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4375 pid=5001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862363532633735386464663763663737333065376235633038643032 Dec 13 14:17:20.533000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.533000 audit[5001]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4375 pid=5001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862363532633735386464663763663737333065376235633038643032 Dec 13 14:17:20.533000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.533000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.533000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.533000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.533000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.533000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.533000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.533000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.533000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.533000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.533000 audit: BPF prog-id=191 op=LOAD Dec 13 14:17:20.533000 audit[5001]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4375 pid=5001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862363532633735386464663763663737333065376235633038643032 Dec 13 14:17:20.533000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.533000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.533000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.533000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.533000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.533000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.533000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.533000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.533000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.533000 audit: BPF prog-id=192 op=LOAD Dec 13 14:17:20.533000 audit[5001]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4375 pid=5001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862363532633735386464663763663737333065376235633038643032 Dec 13 14:17:20.534000 audit: BPF prog-id=192 op=UNLOAD Dec 13 14:17:20.534000 audit: BPF prog-id=191 op=UNLOAD Dec 13 14:17:20.534000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.534000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.534000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.534000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.534000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.534000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.534000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.534000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.534000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.534000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:20.534000 audit: BPF prog-id=193 op=LOAD Dec 13 14:17:20.534000 audit[5001]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4375 pid=5001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:20.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862363532633735386464663763663737333065376235633038643032 Dec 13 14:17:20.682475 env[1814]: time="2024-12-13T14:17:20.682285534Z" level=info msg="StartContainer for \"8b652c758ddf7cf7730e7b5c08d025079c7cb9908e9e7bc0c2df68e755e1cd96\" returns successfully" Dec 13 14:17:21.157982 kubelet[2977]: I1213 14:17:21.157685 2977 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-4bslf" podStartSLOduration=44.157522991 podStartE2EDuration="44.157522991s" podCreationTimestamp="2024-12-13 14:16:37 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:17:21.12525127 +0000 UTC m=+47.792759947" watchObservedRunningTime="2024-12-13 14:17:21.157522991 +0000 UTC m=+47.825031896" Dec 13 14:17:21.211771 kubelet[2977]: I1213 14:17:21.211662 2977 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-67c8d7c486-twvr5" podStartSLOduration=29.814352346 podStartE2EDuration="35.211635377s" podCreationTimestamp="2024-12-13 14:16:46 +0000 UTC" firstStartedPulling="2024-12-13 14:17:14.793419654 +0000 UTC m=+41.460928283" lastFinishedPulling="2024-12-13 14:17:20.190702697 +0000 UTC m=+46.858211314" observedRunningTime="2024-12-13 14:17:21.160001661 +0000 UTC m=+47.827510362" watchObservedRunningTime="2024-12-13 14:17:21.211635377 +0000 UTC m=+47.879144006" Dec 13 14:17:21.218488 systemd-networkd[1534]: calic2011824c8e: Gained IPv6LL Dec 13 14:17:21.320584 kubelet[2977]: I1213 14:17:21.320444 2977 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-c65g5" podStartSLOduration=44.320415379 podStartE2EDuration="44.320415379s" podCreationTimestamp="2024-12-13 14:16:37 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:17:21.212311688 +0000 UTC m=+47.879820413" watchObservedRunningTime="2024-12-13 14:17:21.320415379 +0000 UTC m=+47.987923996" Dec 13 14:17:21.441000 audit[5057]: NETFILTER_CFG table=filter:107 family=2 entries=16 op=nft_register_rule pid=5057 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:21.441000 audit[5057]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=fffff8034aa0 a2=0 a3=1 items=0 ppid=3137 pid=5057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:21.441000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:21.450000 audit[5057]: NETFILTER_CFG table=nat:108 family=2 entries=14 op=nft_register_rule pid=5057 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:21.450000 audit[5057]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=fffff8034aa0 a2=0 a3=1 items=0 ppid=3137 pid=5057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:21.450000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:21.489000 audit[5059]: NETFILTER_CFG table=filter:109 family=2 entries=13 op=nft_register_rule pid=5059 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:21.489000 audit[5059]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffdd4ff080 a2=0 a3=1 items=0 ppid=3137 pid=5059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:21.489000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:21.541000 audit[5059]: NETFILTER_CFG table=nat:110 family=2 entries=47 op=nft_register_chain pid=5059 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:21.541000 audit[5059]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffdd4ff080 a2=0 a3=1 items=0 ppid=3137 pid=5059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:21.541000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:22.090872 kubelet[2977]: I1213 14:17:22.090811 2977 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:17:23.430000 audit[5019]: AVC avc: denied { watch } for pid=5019 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_17_01.3740626422/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c884 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c215,c884 tclass=file permissive=0 Dec 13 14:17:23.433794 kernel: kauditd_printk_skb: 413 callbacks suppressed Dec 13 14:17:23.433937 kernel: audit: type=1400 audit(1734099443.430:1261): avc: denied { watch } for pid=5019 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_17_01.3740626422/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c884 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c215,c884 tclass=file permissive=0 Dec 13 14:17:23.430000 audit[5019]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40017266c0 a2=fc6 a3=0 items=0 ppid=4375 pid=5019 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c884 key=(null) Dec 13 14:17:23.459436 kernel: audit: type=1300 audit(1734099443.430:1261): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40017266c0 a2=fc6 a3=0 items=0 ppid=4375 pid=5019 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c884 key=(null) Dec 13 14:17:23.430000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:17:23.479610 kernel: audit: type=1327 audit(1734099443.430:1261): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:17:24.552325 env[1814]: time="2024-12-13T14:17:24.552146621Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:24.556743 env[1814]: time="2024-12-13T14:17:24.556407109Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:32c335fdb9d757e7ba6a76a9cfa8d292a5a229101ae7ea37b42f53c28adf2db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:24.560721 env[1814]: time="2024-12-13T14:17:24.560484770Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:24.566130 env[1814]: time="2024-12-13T14:17:24.564545307Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:24.567221 env[1814]: time="2024-12-13T14:17:24.565961758Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:32c335fdb9d757e7ba6a76a9cfa8d292a5a229101ae7ea37b42f53c28adf2db1\"" Dec 13 14:17:24.576431 env[1814]: time="2024-12-13T14:17:24.576072398Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:17:24.601584 env[1814]: time="2024-12-13T14:17:24.601504876Z" level=info msg="CreateContainer within sandbox \"e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:17:24.634993 env[1814]: time="2024-12-13T14:17:24.634900020Z" level=info msg="CreateContainer within sandbox \"e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"e6b4aabc4628cd21c1e09efb3e02deedfb32f6db3522fd2df449a90ebf687186\"" Dec 13 14:17:24.636355 env[1814]: time="2024-12-13T14:17:24.636269456Z" level=info msg="StartContainer for \"e6b4aabc4628cd21c1e09efb3e02deedfb32f6db3522fd2df449a90ebf687186\"" Dec 13 14:17:24.643902 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1098946398.mount: Deactivated successfully. Dec 13 14:17:24.715638 systemd[1]: Started cri-containerd-e6b4aabc4628cd21c1e09efb3e02deedfb32f6db3522fd2df449a90ebf687186.scope. Dec 13 14:17:24.739953 systemd[1]: Started sshd@7-172.31.31.121:22-139.178.89.65:35154.service. Dec 13 14:17:24.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.31.121:22-139.178.89.65:35154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:24.759180 kernel: audit: type=1130 audit(1734099444.744:1262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.31.121:22-139.178.89.65:35154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:24.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.817425 kernel: audit: type=1400 audit(1734099444.799:1263): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.817577 kernel: audit: type=1400 audit(1734099444.799:1264): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.825604 kernel: audit: type=1400 audit(1734099444.799:1265): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.835857 kernel: audit: type=1400 audit(1734099444.799:1266): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.851160 kernel: audit: type=1400 audit(1734099444.799:1267): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.868613 kernel: audit: type=1400 audit(1734099444.799:1268): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.808000 audit: BPF prog-id=194 op=LOAD Dec 13 14:17:24.817000 audit[5076]: AVC avc: denied { bpf } for pid=5076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.817000 audit[5076]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4481 pid=5076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:24.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536623461616263343632386364323163316530396566623365303264 Dec 13 14:17:24.817000 audit[5076]: AVC avc: denied { perfmon } for pid=5076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.817000 audit[5076]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4481 pid=5076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:24.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536623461616263343632386364323163316530396566623365303264 Dec 13 14:17:24.817000 audit[5076]: AVC avc: denied { bpf } for pid=5076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.817000 audit[5076]: AVC avc: denied { bpf } for pid=5076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.817000 audit[5076]: AVC avc: denied { bpf } for pid=5076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.817000 audit[5076]: AVC avc: denied { perfmon } for pid=5076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.817000 audit[5076]: AVC avc: denied { perfmon } for pid=5076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.817000 audit[5076]: AVC avc: denied { perfmon } for pid=5076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.817000 audit[5076]: AVC avc: denied { perfmon } for pid=5076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.817000 audit[5076]: AVC avc: denied { perfmon } for pid=5076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.817000 audit[5076]: AVC avc: denied { bpf } for pid=5076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.817000 audit[5076]: AVC avc: denied { bpf } for pid=5076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.817000 audit: BPF prog-id=195 op=LOAD Dec 13 14:17:24.817000 audit[5076]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4481 pid=5076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:24.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536623461616263343632386364323163316530396566623365303264 Dec 13 14:17:24.830000 audit[5076]: AVC avc: denied { bpf } for pid=5076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.830000 audit[5076]: AVC avc: denied { bpf } for pid=5076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.830000 audit[5076]: AVC avc: denied { perfmon } for pid=5076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.830000 audit[5076]: AVC avc: denied { perfmon } for pid=5076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.830000 audit[5076]: AVC avc: denied { perfmon } for pid=5076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.830000 audit[5076]: AVC avc: denied { perfmon } for pid=5076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.830000 audit[5076]: AVC avc: denied { perfmon } for pid=5076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.830000 audit[5076]: AVC avc: denied { bpf } for pid=5076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.830000 audit[5076]: AVC avc: denied { bpf } for pid=5076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.830000 audit: BPF prog-id=196 op=LOAD Dec 13 14:17:24.830000 audit[5076]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4481 pid=5076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:24.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536623461616263343632386364323163316530396566623365303264 Dec 13 14:17:24.840000 audit: BPF prog-id=196 op=UNLOAD Dec 13 14:17:24.840000 audit: BPF prog-id=195 op=UNLOAD Dec 13 14:17:24.840000 audit[5076]: AVC avc: denied { bpf } for pid=5076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.840000 audit[5076]: AVC avc: denied { bpf } for pid=5076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.840000 audit[5076]: AVC avc: denied { bpf } for pid=5076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.840000 audit[5076]: AVC avc: denied { perfmon } for pid=5076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.840000 audit[5076]: AVC avc: denied { perfmon } for pid=5076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.840000 audit[5076]: AVC avc: denied { perfmon } for pid=5076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.840000 audit[5076]: AVC avc: denied { perfmon } for pid=5076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.840000 audit[5076]: AVC avc: denied { perfmon } for pid=5076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.840000 audit[5076]: AVC avc: denied { bpf } for pid=5076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.840000 audit[5076]: AVC avc: denied { bpf } for pid=5076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:24.840000 audit: BPF prog-id=197 op=LOAD Dec 13 14:17:24.840000 audit[5076]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4481 pid=5076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:24.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536623461616263343632386364323163316530396566623365303264 Dec 13 14:17:24.993600 sshd[5089]: Accepted publickey for core from 139.178.89.65 port 35154 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:24.992000 audit[5089]: USER_ACCT pid=5089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:24.995000 audit[5089]: CRED_ACQ pid=5089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:24.996000 audit[5089]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffca3f1b60 a2=3 a3=1 items=0 ppid=1 pid=5089 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:24.996000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:24.998599 sshd[5089]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:25.003892 env[1814]: time="2024-12-13T14:17:25.003832093Z" level=info msg="StartContainer for \"e6b4aabc4628cd21c1e09efb3e02deedfb32f6db3522fd2df449a90ebf687186\" returns successfully" Dec 13 14:17:25.013803 systemd-logind[1803]: New session 8 of user core. Dec 13 14:17:25.015891 systemd[1]: Started session-8.scope. Dec 13 14:17:25.036000 audit[5089]: USER_START pid=5089 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:25.039000 audit[5109]: CRED_ACQ pid=5109 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:25.473551 sshd[5089]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:25.475000 audit[5089]: USER_END pid=5089 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:25.476000 audit[5089]: CRED_DISP pid=5089 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:25.480968 systemd[1]: sshd@7-172.31.31.121:22-139.178.89.65:35154.service: Deactivated successfully. Dec 13 14:17:25.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.31.121:22-139.178.89.65:35154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:25.482408 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:17:25.483074 systemd-logind[1803]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:17:25.485020 systemd-logind[1803]: Removed session 8. Dec 13 14:17:25.501611 kubelet[2977]: I1213 14:17:25.501514 2977 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6947bb669-zq9km" podStartSLOduration=28.405309722 podStartE2EDuration="37.501490242s" podCreationTimestamp="2024-12-13 14:16:48 +0000 UTC" firstStartedPulling="2024-12-13 14:17:15.472282601 +0000 UTC m=+42.139791230" lastFinishedPulling="2024-12-13 14:17:24.568463121 +0000 UTC m=+51.235971750" observedRunningTime="2024-12-13 14:17:25.179121548 +0000 UTC m=+51.846630213" watchObservedRunningTime="2024-12-13 14:17:25.501490242 +0000 UTC m=+52.168998871" Dec 13 14:17:26.123594 env[1814]: time="2024-12-13T14:17:26.123536139Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:26.127928 env[1814]: time="2024-12-13T14:17:26.127875484Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:26.131201 env[1814]: time="2024-12-13T14:17:26.131078580Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:26.135516 env[1814]: time="2024-12-13T14:17:26.135459480Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:26.137757 env[1814]: time="2024-12-13T14:17:26.136944943Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163\"" Dec 13 14:17:26.141497 env[1814]: time="2024-12-13T14:17:26.141430144Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:17:26.145478 env[1814]: time="2024-12-13T14:17:26.143972862Z" level=info msg="CreateContainer within sandbox \"e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:17:26.182912 env[1814]: time="2024-12-13T14:17:26.182827833Z" level=info msg="CreateContainer within sandbox \"e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"e0837e2c7fade249e8240e81d7f478767c0e1b32cf90f7d2f3d62b3d13401acd\"" Dec 13 14:17:26.184421 env[1814]: time="2024-12-13T14:17:26.184287125Z" level=info msg="StartContainer for \"e0837e2c7fade249e8240e81d7f478767c0e1b32cf90f7d2f3d62b3d13401acd\"" Dec 13 14:17:26.266679 systemd[1]: Started cri-containerd-e0837e2c7fade249e8240e81d7f478767c0e1b32cf90f7d2f3d62b3d13401acd.scope. Dec 13 14:17:26.388000 audit[5149]: AVC avc: denied { perfmon } for pid=5149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.388000 audit[5149]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4580 pid=5149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:26.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530383337653263376661646532343965383234306538316437663437 Dec 13 14:17:26.388000 audit[5149]: AVC avc: denied { bpf } for pid=5149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.388000 audit[5149]: AVC avc: denied { bpf } for pid=5149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.388000 audit[5149]: AVC avc: denied { bpf } for pid=5149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.388000 audit[5149]: AVC avc: denied { perfmon } for pid=5149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.388000 audit[5149]: AVC avc: denied { perfmon } for pid=5149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.388000 audit[5149]: AVC avc: denied { perfmon } for pid=5149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.388000 audit[5149]: AVC avc: denied { perfmon } for pid=5149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.388000 audit[5149]: AVC avc: denied { perfmon } for pid=5149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.388000 audit[5149]: AVC avc: denied { bpf } for pid=5149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.388000 audit[5149]: AVC avc: denied { bpf } for pid=5149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.388000 audit: BPF prog-id=198 op=LOAD Dec 13 14:17:26.388000 audit[5149]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4580 pid=5149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:26.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530383337653263376661646532343965383234306538316437663437 Dec 13 14:17:26.388000 audit[5149]: AVC avc: denied { bpf } for pid=5149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.388000 audit[5149]: AVC avc: denied { bpf } for pid=5149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.388000 audit[5149]: AVC avc: denied { perfmon } for pid=5149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.388000 audit[5149]: AVC avc: denied { perfmon } for pid=5149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.388000 audit[5149]: AVC avc: denied { perfmon } for pid=5149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.388000 audit[5149]: AVC avc: denied { perfmon } for pid=5149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.388000 audit[5149]: AVC avc: denied { perfmon } for pid=5149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.388000 audit[5149]: AVC avc: denied { bpf } for pid=5149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.388000 audit[5149]: AVC avc: denied { bpf } for pid=5149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.388000 audit: BPF prog-id=199 op=LOAD Dec 13 14:17:26.388000 audit[5149]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4580 pid=5149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:26.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530383337653263376661646532343965383234306538316437663437 Dec 13 14:17:26.388000 audit: BPF prog-id=199 op=UNLOAD Dec 13 14:17:26.389000 audit: BPF prog-id=198 op=UNLOAD Dec 13 14:17:26.389000 audit[5149]: AVC avc: denied { bpf } for pid=5149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.389000 audit[5149]: AVC avc: denied { bpf } for pid=5149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.389000 audit[5149]: AVC avc: denied { bpf } for pid=5149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.389000 audit[5149]: AVC avc: denied { perfmon } for pid=5149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.389000 audit[5149]: AVC avc: denied { perfmon } for pid=5149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.389000 audit[5149]: AVC avc: denied { perfmon } for pid=5149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.389000 audit[5149]: AVC avc: denied { perfmon } for pid=5149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.389000 audit[5149]: AVC avc: denied { perfmon } for pid=5149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.389000 audit[5149]: AVC avc: denied { bpf } for pid=5149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.389000 audit[5149]: AVC avc: denied { bpf } for pid=5149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.389000 audit: BPF prog-id=200 op=LOAD Dec 13 14:17:26.389000 audit[5149]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4580 pid=5149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:26.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530383337653263376661646532343965383234306538316437663437 Dec 13 14:17:26.440787 env[1814]: time="2024-12-13T14:17:26.440716361Z" level=info msg="StartContainer for \"e0837e2c7fade249e8240e81d7f478767c0e1b32cf90f7d2f3d62b3d13401acd\" returns successfully" Dec 13 14:17:26.462038 env[1814]: time="2024-12-13T14:17:26.461968918Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:26.466842 env[1814]: time="2024-12-13T14:17:26.466769291Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:26.470801 env[1814]: time="2024-12-13T14:17:26.470744338Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:26.474397 env[1814]: time="2024-12-13T14:17:26.474329143Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:26.475622 env[1814]: time="2024-12-13T14:17:26.475568169Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c\"" Dec 13 14:17:26.479428 env[1814]: time="2024-12-13T14:17:26.479360173Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:17:26.481193 env[1814]: time="2024-12-13T14:17:26.480725088Z" level=info msg="CreateContainer within sandbox \"41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:17:26.510907 env[1814]: time="2024-12-13T14:17:26.510820563Z" level=info msg="CreateContainer within sandbox \"41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"80d3e14315fe1173906ad0dfec0533031949d19225851f0be54101ce2a39d230\"" Dec 13 14:17:26.512299 env[1814]: time="2024-12-13T14:17:26.512243964Z" level=info msg="StartContainer for \"80d3e14315fe1173906ad0dfec0533031949d19225851f0be54101ce2a39d230\"" Dec 13 14:17:26.552871 systemd[1]: Started cri-containerd-80d3e14315fe1173906ad0dfec0533031949d19225851f0be54101ce2a39d230.scope. Dec 13 14:17:26.580332 systemd[1]: run-containerd-runc-k8s.io-e0837e2c7fade249e8240e81d7f478767c0e1b32cf90f7d2f3d62b3d13401acd-runc.EkMQBW.mount: Deactivated successfully. Dec 13 14:17:26.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.634000 audit: BPF prog-id=201 op=LOAD Dec 13 14:17:26.635000 audit[5182]: AVC avc: denied { bpf } for pid=5182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.635000 audit[5182]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=4776 pid=5182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:26.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830643365313433313566653131373339303661643064666563303533 Dec 13 14:17:26.635000 audit[5182]: AVC avc: denied { perfmon } for pid=5182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.635000 audit[5182]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=4776 pid=5182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:26.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830643365313433313566653131373339303661643064666563303533 Dec 13 14:17:26.635000 audit[5182]: AVC avc: denied { bpf } for pid=5182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.635000 audit[5182]: AVC avc: denied { bpf } for pid=5182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.635000 audit[5182]: AVC avc: denied { bpf } for pid=5182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.635000 audit[5182]: AVC avc: denied { perfmon } for pid=5182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.635000 audit[5182]: AVC avc: denied { perfmon } for pid=5182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.635000 audit[5182]: AVC avc: denied { perfmon } for pid=5182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.635000 audit[5182]: AVC avc: denied { perfmon } for pid=5182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.635000 audit[5182]: AVC avc: denied { perfmon } for pid=5182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.635000 audit[5182]: AVC avc: denied { bpf } for pid=5182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.635000 audit[5182]: AVC avc: denied { bpf } for pid=5182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.635000 audit: BPF prog-id=202 op=LOAD Dec 13 14:17:26.635000 audit[5182]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=4776 pid=5182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:26.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830643365313433313566653131373339303661643064666563303533 Dec 13 14:17:26.636000 audit[5182]: AVC avc: denied { bpf } for pid=5182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.636000 audit[5182]: AVC avc: denied { bpf } for pid=5182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.636000 audit[5182]: AVC avc: denied { perfmon } for pid=5182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.636000 audit[5182]: AVC avc: denied { perfmon } for pid=5182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.636000 audit[5182]: AVC avc: denied { perfmon } for pid=5182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.636000 audit[5182]: AVC avc: denied { perfmon } for pid=5182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.636000 audit[5182]: AVC avc: denied { perfmon } for pid=5182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.636000 audit[5182]: AVC avc: denied { bpf } for pid=5182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.636000 audit[5182]: AVC avc: denied { bpf } for pid=5182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.636000 audit: BPF prog-id=203 op=LOAD Dec 13 14:17:26.636000 audit[5182]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=4776 pid=5182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:26.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830643365313433313566653131373339303661643064666563303533 Dec 13 14:17:26.636000 audit: BPF prog-id=203 op=UNLOAD Dec 13 14:17:26.636000 audit: BPF prog-id=202 op=UNLOAD Dec 13 14:17:26.636000 audit[5182]: AVC avc: denied { bpf } for pid=5182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.636000 audit[5182]: AVC avc: denied { bpf } for pid=5182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.636000 audit[5182]: AVC avc: denied { bpf } for pid=5182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.636000 audit[5182]: AVC avc: denied { perfmon } for pid=5182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.636000 audit[5182]: AVC avc: denied { perfmon } for pid=5182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.636000 audit[5182]: AVC avc: denied { perfmon } for pid=5182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.636000 audit[5182]: AVC avc: denied { perfmon } for pid=5182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.636000 audit[5182]: AVC avc: denied { perfmon } for pid=5182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.636000 audit[5182]: AVC avc: denied { bpf } for pid=5182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.636000 audit[5182]: AVC avc: denied { bpf } for pid=5182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:26.636000 audit: BPF prog-id=204 op=LOAD Dec 13 14:17:26.636000 audit[5182]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=4776 pid=5182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:26.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830643365313433313566653131373339303661643064666563303533 Dec 13 14:17:26.728192 env[1814]: time="2024-12-13T14:17:26.727078573Z" level=info msg="StartContainer for \"80d3e14315fe1173906ad0dfec0533031949d19225851f0be54101ce2a39d230\" returns successfully" Dec 13 14:17:27.224000 audit[5213]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=5213 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:27.224000 audit[5213]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffd97992c0 a2=0 a3=1 items=0 ppid=3137 pid=5213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.224000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:27.236000 audit[5213]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=5213 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:27.236000 audit[5213]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffd97992c0 a2=0 a3=1 items=0 ppid=3137 pid=5213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.236000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:28.065860 env[1814]: time="2024-12-13T14:17:28.065796744Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:28.069241 env[1814]: time="2024-12-13T14:17:28.069171657Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:28.073461 env[1814]: time="2024-12-13T14:17:28.073404008Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:28.075119 env[1814]: time="2024-12-13T14:17:28.074636437Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349\"" Dec 13 14:17:28.077166 env[1814]: time="2024-12-13T14:17:28.076751574Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:28.082194 env[1814]: time="2024-12-13T14:17:28.081946648Z" level=info msg="CreateContainer within sandbox \"e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:17:28.117807 env[1814]: time="2024-12-13T14:17:28.117695444Z" level=info msg="CreateContainer within sandbox \"e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"8f78f54755819777deefb4d9e549584063ef8df99bd08b368e40474b283ed9a0\"" Dec 13 14:17:28.119993 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount894779090.mount: Deactivated successfully. Dec 13 14:17:28.121069 env[1814]: time="2024-12-13T14:17:28.120961244Z" level=info msg="StartContainer for \"8f78f54755819777deefb4d9e549584063ef8df99bd08b368e40474b283ed9a0\"" Dec 13 14:17:28.137416 kubelet[2977]: I1213 14:17:28.137352 2977 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:17:28.188780 systemd[1]: Started cri-containerd-8f78f54755819777deefb4d9e549584063ef8df99bd08b368e40474b283ed9a0.scope. Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { perfmon } for pid=5223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit[5223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4580 pid=5223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:28.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866373866353437353538313937373764656566623464396535343935 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { bpf } for pid=5223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { bpf } for pid=5223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { bpf } for pid=5223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { perfmon } for pid=5223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { perfmon } for pid=5223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { perfmon } for pid=5223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { perfmon } for pid=5223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { perfmon } for pid=5223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { bpf } for pid=5223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { bpf } for pid=5223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit: BPF prog-id=205 op=LOAD Dec 13 14:17:28.270000 audit[5223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4580 pid=5223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:28.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866373866353437353538313937373764656566623464396535343935 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { bpf } for pid=5223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { bpf } for pid=5223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { perfmon } for pid=5223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { perfmon } for pid=5223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { perfmon } for pid=5223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { perfmon } for pid=5223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { perfmon } for pid=5223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { bpf } for pid=5223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { bpf } for pid=5223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit: BPF prog-id=206 op=LOAD Dec 13 14:17:28.270000 audit[5223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4580 pid=5223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:28.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866373866353437353538313937373764656566623464396535343935 Dec 13 14:17:28.270000 audit: BPF prog-id=206 op=UNLOAD Dec 13 14:17:28.270000 audit: BPF prog-id=205 op=UNLOAD Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { bpf } for pid=5223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { bpf } for pid=5223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { bpf } for pid=5223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { perfmon } for pid=5223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { perfmon } for pid=5223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { perfmon } for pid=5223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { perfmon } for pid=5223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { perfmon } for pid=5223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { bpf } for pid=5223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit[5223]: AVC avc: denied { bpf } for pid=5223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:28.270000 audit: BPF prog-id=207 op=LOAD Dec 13 14:17:28.270000 audit[5223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4580 pid=5223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:28.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866373866353437353538313937373764656566623464396535343935 Dec 13 14:17:28.326225 env[1814]: time="2024-12-13T14:17:28.325981916Z" level=info msg="StartContainer for \"8f78f54755819777deefb4d9e549584063ef8df99bd08b368e40474b283ed9a0\" returns successfully" Dec 13 14:17:28.837039 kubelet[2977]: I1213 14:17:28.836988 2977 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:17:28.837039 kubelet[2977]: I1213 14:17:28.837040 2977 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:17:28.958159 kernel: kauditd_printk_skb: 210 callbacks suppressed Dec 13 14:17:28.958335 kernel: audit: type=1400 audit(1734099448.952:1321): avc: denied { watch } for pid=2591 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7330 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:28.952000 audit[2591]: AVC avc: denied { watch } for pid=2591 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7330 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:28.952000 audit[2591]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=40089f0540 a2=fc6 a3=0 items=0 ppid=2420 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 key=(null) Dec 13 14:17:28.978509 kernel: audit: type=1300 audit(1734099448.952:1321): arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=40089f0540 a2=fc6 a3=0 items=0 ppid=2420 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 key=(null) Dec 13 14:17:28.952000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E313231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:17:28.988445 kernel: audit: type=1327 audit(1734099448.952:1321): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E313231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:17:28.955000 audit[2591]: AVC avc: denied { watch } for pid=2591 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:28.997539 kernel: audit: type=1400 audit(1734099448.955:1322): avc: denied { watch } for pid=2591 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:28.955000 audit[2591]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=400d913d40 a2=fc6 a3=0 items=0 ppid=2420 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 key=(null) Dec 13 14:17:29.009152 kernel: audit: type=1300 audit(1734099448.955:1322): arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=400d913d40 a2=fc6 a3=0 items=0 ppid=2420 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 key=(null) Dec 13 14:17:28.955000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E313231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:17:29.020732 kernel: audit: type=1327 audit(1734099448.955:1322): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E313231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:17:28.966000 audit[2591]: AVC avc: denied { watch } for pid=2591 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=7328 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:29.030174 kernel: audit: type=1400 audit(1734099448.966:1323): avc: denied { watch } for pid=2591 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=7328 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:29.030319 kernel: audit: type=1300 audit(1734099448.966:1323): arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=40089f05a0 a2=fc6 a3=0 items=0 ppid=2420 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 key=(null) Dec 13 14:17:28.966000 audit[2591]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=40089f05a0 a2=fc6 a3=0 items=0 ppid=2420 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 key=(null) Dec 13 14:17:28.966000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E313231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:17:29.051595 kernel: audit: type=1327 audit(1734099448.966:1323): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E313231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:17:29.178960 kubelet[2977]: I1213 14:17:29.178773 2977 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-67c8d7c486-ncfff" podStartSLOduration=36.516580089 podStartE2EDuration="43.178730654s" podCreationTimestamp="2024-12-13 14:16:46 +0000 UTC" firstStartedPulling="2024-12-13 14:17:19.815783123 +0000 UTC m=+46.483291752" lastFinishedPulling="2024-12-13 14:17:26.4779337 +0000 UTC m=+53.145442317" observedRunningTime="2024-12-13 14:17:27.15893508 +0000 UTC m=+53.826443733" watchObservedRunningTime="2024-12-13 14:17:29.178730654 +0000 UTC m=+55.846239283" Dec 13 14:17:29.188000 audit[2591]: AVC avc: denied { watch } for pid=2591 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=7332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:29.188000 audit[2591]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=400e0d5170 a2=fc6 a3=0 items=0 ppid=2420 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 key=(null) Dec 13 14:17:29.188000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E313231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:17:29.201125 kernel: audit: type=1400 audit(1734099449.188:1324): avc: denied { watch } for pid=2591 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=7332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:29.228000 audit[2591]: AVC avc: denied { watch } for pid=2591 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:29.228000 audit[2591]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=400e4d0740 a2=fc6 a3=0 items=0 ppid=2420 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 key=(null) Dec 13 14:17:29.228000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E313231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:17:29.228000 audit[2591]: AVC avc: denied { watch } for pid=2591 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7330 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:29.228000 audit[2591]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=400e0d59e0 a2=fc6 a3=0 items=0 ppid=2420 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 key=(null) Dec 13 14:17:29.228000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E313231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:17:29.292000 audit[2577]: AVC avc: denied { watch } for pid=2577 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:29.292000 audit[2577]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40018aea00 a2=fc6 a3=0 items=0 ppid=2401 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 key=(null) Dec 13 14:17:29.292000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:17:29.293000 audit[2577]: AVC avc: denied { watch } for pid=2577 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7330 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:29.293000 audit[2577]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001c78d80 a2=fc6 a3=0 items=0 ppid=2401 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 key=(null) Dec 13 14:17:29.293000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:17:30.504023 systemd[1]: Started sshd@8-172.31.31.121:22-139.178.89.65:51138.service. Dec 13 14:17:30.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.31.121:22-139.178.89.65:51138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:30.695755 sshd[5258]: Accepted publickey for core from 139.178.89.65 port 51138 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:30.694000 audit[5258]: USER_ACCT pid=5258 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:30.697000 audit[5258]: CRED_ACQ pid=5258 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:30.697000 audit[5258]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff3e27b50 a2=3 a3=1 items=0 ppid=1 pid=5258 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:30.697000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:30.699874 sshd[5258]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:30.710349 systemd-logind[1803]: New session 9 of user core. Dec 13 14:17:30.723255 systemd[1]: Started session-9.scope. Dec 13 14:17:30.740000 audit[5258]: USER_START pid=5258 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:30.743000 audit[5260]: CRED_ACQ pid=5260 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:31.077904 sshd[5258]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:31.078000 audit[5258]: USER_END pid=5258 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:31.078000 audit[5258]: CRED_DISP pid=5258 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:31.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.31.121:22-139.178.89.65:51138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:31.083623 systemd[1]: sshd@8-172.31.31.121:22-139.178.89.65:51138.service: Deactivated successfully. Dec 13 14:17:31.085029 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:17:31.086960 systemd-logind[1803]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:17:31.089955 systemd-logind[1803]: Removed session 9. Dec 13 14:17:31.434000 audit[5193]: AVC avc: denied { watch } for pid=5193 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_17_01.3172771795/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c111,c509 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c111,c509 tclass=file permissive=0 Dec 13 14:17:31.434000 audit[5193]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000355700 a2=fc6 a3=0 items=0 ppid=4776 pid=5193 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c111,c509 key=(null) Dec 13 14:17:31.434000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:17:33.312000 audit[2577]: AVC avc: denied { watch } for pid=2577 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:33.312000 audit[2577]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001eda520 a2=fc6 a3=0 items=0 ppid=2401 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 key=(null) Dec 13 14:17:33.312000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:17:33.313000 audit[2577]: AVC avc: denied { watch } for pid=2577 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:33.313000 audit[2577]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001eda860 a2=fc6 a3=0 items=0 ppid=2401 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 key=(null) Dec 13 14:17:33.313000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:17:33.316000 audit[2577]: AVC avc: denied { watch } for pid=2577 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:33.316000 audit[2577]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001edaba0 a2=fc6 a3=0 items=0 ppid=2401 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 key=(null) Dec 13 14:17:33.316000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:17:33.316000 audit[2577]: AVC avc: denied { watch } for pid=2577 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:33.316000 audit[2577]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001d01aa0 a2=fc6 a3=0 items=0 ppid=2401 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 key=(null) Dec 13 14:17:33.316000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:17:33.594714 env[1814]: time="2024-12-13T14:17:33.593933383Z" level=info msg="StopPodSandbox for \"b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954\"" Dec 13 14:17:33.747276 env[1814]: 2024-12-13 14:17:33.673 [WARNING][5281] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--ncfff-eth0", GenerateName:"calico-apiserver-67c8d7c486-", Namespace:"calico-apiserver", SelfLink:"", UID:"88fddb2e-ae6a-4869-a25b-6bff4dd7b4da", ResourceVersion:"895", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67c8d7c486", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-121", ContainerID:"41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db", Pod:"calico-apiserver-67c8d7c486-ncfff", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.94.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5a2ce9bda3e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:33.747276 env[1814]: 2024-12-13 14:17:33.673 [INFO][5281] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" Dec 13 14:17:33.747276 env[1814]: 2024-12-13 14:17:33.674 [INFO][5281] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" iface="eth0" netns="" Dec 13 14:17:33.747276 env[1814]: 2024-12-13 14:17:33.674 [INFO][5281] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" Dec 13 14:17:33.747276 env[1814]: 2024-12-13 14:17:33.674 [INFO][5281] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" Dec 13 14:17:33.747276 env[1814]: 2024-12-13 14:17:33.720 [INFO][5288] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" HandleID="k8s-pod-network.b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" Workload="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--ncfff-eth0" Dec 13 14:17:33.747276 env[1814]: 2024-12-13 14:17:33.720 [INFO][5288] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:33.747276 env[1814]: 2024-12-13 14:17:33.720 [INFO][5288] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:33.747276 env[1814]: 2024-12-13 14:17:33.734 [WARNING][5288] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" HandleID="k8s-pod-network.b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" Workload="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--ncfff-eth0" Dec 13 14:17:33.747276 env[1814]: 2024-12-13 14:17:33.737 [INFO][5288] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" HandleID="k8s-pod-network.b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" Workload="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--ncfff-eth0" Dec 13 14:17:33.747276 env[1814]: 2024-12-13 14:17:33.741 [INFO][5288] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:33.747276 env[1814]: 2024-12-13 14:17:33.744 [INFO][5281] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" Dec 13 14:17:33.748281 env[1814]: time="2024-12-13T14:17:33.747322443Z" level=info msg="TearDown network for sandbox \"b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954\" successfully" Dec 13 14:17:33.748281 env[1814]: time="2024-12-13T14:17:33.747371162Z" level=info msg="StopPodSandbox for \"b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954\" returns successfully" Dec 13 14:17:33.749391 env[1814]: time="2024-12-13T14:17:33.749342623Z" level=info msg="RemovePodSandbox for \"b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954\"" Dec 13 14:17:33.749686 env[1814]: time="2024-12-13T14:17:33.749600197Z" level=info msg="Forcibly stopping sandbox \"b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954\"" Dec 13 14:17:33.907444 env[1814]: 2024-12-13 14:17:33.836 [WARNING][5309] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--ncfff-eth0", GenerateName:"calico-apiserver-67c8d7c486-", Namespace:"calico-apiserver", SelfLink:"", UID:"88fddb2e-ae6a-4869-a25b-6bff4dd7b4da", ResourceVersion:"895", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67c8d7c486", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-121", ContainerID:"41cc7aefc56710ba60a163caf9c783e3de23201c218a476a60c131e2550074db", Pod:"calico-apiserver-67c8d7c486-ncfff", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.94.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5a2ce9bda3e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:33.907444 env[1814]: 2024-12-13 14:17:33.836 [INFO][5309] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" Dec 13 14:17:33.907444 env[1814]: 2024-12-13 14:17:33.837 [INFO][5309] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" iface="eth0" netns="" Dec 13 14:17:33.907444 env[1814]: 2024-12-13 14:17:33.837 [INFO][5309] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" Dec 13 14:17:33.907444 env[1814]: 2024-12-13 14:17:33.837 [INFO][5309] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" Dec 13 14:17:33.907444 env[1814]: 2024-12-13 14:17:33.885 [INFO][5316] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" HandleID="k8s-pod-network.b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" Workload="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--ncfff-eth0" Dec 13 14:17:33.907444 env[1814]: 2024-12-13 14:17:33.885 [INFO][5316] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:33.907444 env[1814]: 2024-12-13 14:17:33.885 [INFO][5316] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:33.907444 env[1814]: 2024-12-13 14:17:33.898 [WARNING][5316] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" HandleID="k8s-pod-network.b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" Workload="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--ncfff-eth0" Dec 13 14:17:33.907444 env[1814]: 2024-12-13 14:17:33.898 [INFO][5316] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" HandleID="k8s-pod-network.b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" Workload="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--ncfff-eth0" Dec 13 14:17:33.907444 env[1814]: 2024-12-13 14:17:33.900 [INFO][5316] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:33.907444 env[1814]: 2024-12-13 14:17:33.903 [INFO][5309] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954" Dec 13 14:17:33.907444 env[1814]: time="2024-12-13T14:17:33.906389131Z" level=info msg="TearDown network for sandbox \"b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954\" successfully" Dec 13 14:17:33.914037 env[1814]: time="2024-12-13T14:17:33.913915425Z" level=info msg="RemovePodSandbox \"b31ad0ce45081b3b2c701708eccbfe2076966695b339b8f6a5edb01b26f36954\" returns successfully" Dec 13 14:17:33.914883 env[1814]: time="2024-12-13T14:17:33.914829589Z" level=info msg="StopPodSandbox for \"343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6\"" Dec 13 14:17:34.052787 env[1814]: 2024-12-13 14:17:33.990 [WARNING][5334] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--121-k8s-csi--node--driver--bw5cn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cf1319c5-c836-4c8a-8002-1147cc1b3ed7", ResourceVersion:"909", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-121", ContainerID:"e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69", Pod:"csi-node-driver-bw5cn", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.94.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali79b013e6e71", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:34.052787 env[1814]: 2024-12-13 14:17:33.991 [INFO][5334] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" Dec 13 14:17:34.052787 env[1814]: 2024-12-13 14:17:33.991 [INFO][5334] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" iface="eth0" netns="" Dec 13 14:17:34.052787 env[1814]: 2024-12-13 14:17:33.991 [INFO][5334] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" Dec 13 14:17:34.052787 env[1814]: 2024-12-13 14:17:33.991 [INFO][5334] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" Dec 13 14:17:34.052787 env[1814]: 2024-12-13 14:17:34.028 [INFO][5340] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" HandleID="k8s-pod-network.343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" Workload="ip--172--31--31--121-k8s-csi--node--driver--bw5cn-eth0" Dec 13 14:17:34.052787 env[1814]: 2024-12-13 14:17:34.029 [INFO][5340] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:34.052787 env[1814]: 2024-12-13 14:17:34.029 [INFO][5340] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:34.052787 env[1814]: 2024-12-13 14:17:34.043 [WARNING][5340] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" HandleID="k8s-pod-network.343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" Workload="ip--172--31--31--121-k8s-csi--node--driver--bw5cn-eth0" Dec 13 14:17:34.052787 env[1814]: 2024-12-13 14:17:34.044 [INFO][5340] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" HandleID="k8s-pod-network.343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" Workload="ip--172--31--31--121-k8s-csi--node--driver--bw5cn-eth0" Dec 13 14:17:34.052787 env[1814]: 2024-12-13 14:17:34.047 [INFO][5340] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:34.052787 env[1814]: 2024-12-13 14:17:34.050 [INFO][5334] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" Dec 13 14:17:34.054027 env[1814]: time="2024-12-13T14:17:34.052829888Z" level=info msg="TearDown network for sandbox \"343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6\" successfully" Dec 13 14:17:34.054027 env[1814]: time="2024-12-13T14:17:34.052887630Z" level=info msg="StopPodSandbox for \"343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6\" returns successfully" Dec 13 14:17:34.054027 env[1814]: time="2024-12-13T14:17:34.053655170Z" level=info msg="RemovePodSandbox for \"343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6\"" Dec 13 14:17:34.054027 env[1814]: time="2024-12-13T14:17:34.053707321Z" level=info msg="Forcibly stopping sandbox \"343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6\"" Dec 13 14:17:34.219035 env[1814]: 2024-12-13 14:17:34.121 [WARNING][5359] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--121-k8s-csi--node--driver--bw5cn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cf1319c5-c836-4c8a-8002-1147cc1b3ed7", ResourceVersion:"909", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-121", ContainerID:"e7739a9298fbe656dadc910b30324fc5849f4730bb6f8f3300256ae2ccc11c69", Pod:"csi-node-driver-bw5cn", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.94.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali79b013e6e71", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:34.219035 env[1814]: 2024-12-13 14:17:34.121 [INFO][5359] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" Dec 13 14:17:34.219035 env[1814]: 2024-12-13 14:17:34.121 [INFO][5359] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" iface="eth0" netns="" Dec 13 14:17:34.219035 env[1814]: 2024-12-13 14:17:34.121 [INFO][5359] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" Dec 13 14:17:34.219035 env[1814]: 2024-12-13 14:17:34.121 [INFO][5359] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" Dec 13 14:17:34.219035 env[1814]: 2024-12-13 14:17:34.177 [INFO][5366] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" HandleID="k8s-pod-network.343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" Workload="ip--172--31--31--121-k8s-csi--node--driver--bw5cn-eth0" Dec 13 14:17:34.219035 env[1814]: 2024-12-13 14:17:34.177 [INFO][5366] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:34.219035 env[1814]: 2024-12-13 14:17:34.177 [INFO][5366] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:34.219035 env[1814]: 2024-12-13 14:17:34.199 [WARNING][5366] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" HandleID="k8s-pod-network.343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" Workload="ip--172--31--31--121-k8s-csi--node--driver--bw5cn-eth0" Dec 13 14:17:34.219035 env[1814]: 2024-12-13 14:17:34.200 [INFO][5366] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" HandleID="k8s-pod-network.343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" Workload="ip--172--31--31--121-k8s-csi--node--driver--bw5cn-eth0" Dec 13 14:17:34.219035 env[1814]: 2024-12-13 14:17:34.204 [INFO][5366] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:34.219035 env[1814]: 2024-12-13 14:17:34.210 [INFO][5359] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6" Dec 13 14:17:34.219035 env[1814]: time="2024-12-13T14:17:34.217655012Z" level=info msg="TearDown network for sandbox \"343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6\" successfully" Dec 13 14:17:34.230949 env[1814]: time="2024-12-13T14:17:34.230882318Z" level=info msg="RemovePodSandbox \"343634c51d0f260613d552cb592010f324feaee902ae0482a91bd21d55b53fd6\" returns successfully" Dec 13 14:17:34.232066 env[1814]: time="2024-12-13T14:17:34.232002807Z" level=info msg="StopPodSandbox for \"5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b\"" Dec 13 14:17:34.408689 env[1814]: 2024-12-13 14:17:34.340 [WARNING][5389] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--121-k8s-calico--kube--controllers--6947bb669--zq9km-eth0", GenerateName:"calico-kube-controllers-6947bb669-", Namespace:"calico-system", SelfLink:"", UID:"8e9f081f-99e6-45b4-9e95-e66a885398fb", ResourceVersion:"871", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6947bb669", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-121", ContainerID:"e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5", Pod:"calico-kube-controllers-6947bb669-zq9km", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.94.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali796a79abca2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:34.408689 env[1814]: 2024-12-13 14:17:34.341 [INFO][5389] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" Dec 13 14:17:34.408689 env[1814]: 2024-12-13 14:17:34.341 [INFO][5389] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" iface="eth0" netns="" Dec 13 14:17:34.408689 env[1814]: 2024-12-13 14:17:34.341 [INFO][5389] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" Dec 13 14:17:34.408689 env[1814]: 2024-12-13 14:17:34.341 [INFO][5389] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" Dec 13 14:17:34.408689 env[1814]: 2024-12-13 14:17:34.386 [INFO][5395] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" HandleID="k8s-pod-network.5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" Workload="ip--172--31--31--121-k8s-calico--kube--controllers--6947bb669--zq9km-eth0" Dec 13 14:17:34.408689 env[1814]: 2024-12-13 14:17:34.386 [INFO][5395] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:34.408689 env[1814]: 2024-12-13 14:17:34.387 [INFO][5395] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:34.408689 env[1814]: 2024-12-13 14:17:34.401 [WARNING][5395] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" HandleID="k8s-pod-network.5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" Workload="ip--172--31--31--121-k8s-calico--kube--controllers--6947bb669--zq9km-eth0" Dec 13 14:17:34.408689 env[1814]: 2024-12-13 14:17:34.401 [INFO][5395] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" HandleID="k8s-pod-network.5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" Workload="ip--172--31--31--121-k8s-calico--kube--controllers--6947bb669--zq9km-eth0" Dec 13 14:17:34.408689 env[1814]: 2024-12-13 14:17:34.404 [INFO][5395] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:34.408689 env[1814]: 2024-12-13 14:17:34.406 [INFO][5389] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" Dec 13 14:17:34.409922 env[1814]: time="2024-12-13T14:17:34.409869685Z" level=info msg="TearDown network for sandbox \"5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b\" successfully" Dec 13 14:17:34.410068 env[1814]: time="2024-12-13T14:17:34.410034142Z" level=info msg="StopPodSandbox for \"5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b\" returns successfully" Dec 13 14:17:34.411139 env[1814]: time="2024-12-13T14:17:34.411033888Z" level=info msg="RemovePodSandbox for \"5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b\"" Dec 13 14:17:34.411297 env[1814]: time="2024-12-13T14:17:34.411123815Z" level=info msg="Forcibly stopping sandbox \"5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b\"" Dec 13 14:17:34.538429 env[1814]: 2024-12-13 14:17:34.477 [WARNING][5414] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--121-k8s-calico--kube--controllers--6947bb669--zq9km-eth0", GenerateName:"calico-kube-controllers-6947bb669-", Namespace:"calico-system", SelfLink:"", UID:"8e9f081f-99e6-45b4-9e95-e66a885398fb", ResourceVersion:"871", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6947bb669", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-121", ContainerID:"e3608fb1bce97732e823e4a9ac6afb80474a401227a7fa52f280a9fa0c87acf5", Pod:"calico-kube-controllers-6947bb669-zq9km", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.94.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali796a79abca2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:34.538429 env[1814]: 2024-12-13 14:17:34.478 [INFO][5414] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" Dec 13 14:17:34.538429 env[1814]: 2024-12-13 14:17:34.478 [INFO][5414] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" iface="eth0" netns="" Dec 13 14:17:34.538429 env[1814]: 2024-12-13 14:17:34.478 [INFO][5414] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" Dec 13 14:17:34.538429 env[1814]: 2024-12-13 14:17:34.478 [INFO][5414] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" Dec 13 14:17:34.538429 env[1814]: 2024-12-13 14:17:34.514 [INFO][5420] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" HandleID="k8s-pod-network.5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" Workload="ip--172--31--31--121-k8s-calico--kube--controllers--6947bb669--zq9km-eth0" Dec 13 14:17:34.538429 env[1814]: 2024-12-13 14:17:34.514 [INFO][5420] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:34.538429 env[1814]: 2024-12-13 14:17:34.514 [INFO][5420] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:34.538429 env[1814]: 2024-12-13 14:17:34.529 [WARNING][5420] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" HandleID="k8s-pod-network.5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" Workload="ip--172--31--31--121-k8s-calico--kube--controllers--6947bb669--zq9km-eth0" Dec 13 14:17:34.538429 env[1814]: 2024-12-13 14:17:34.529 [INFO][5420] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" HandleID="k8s-pod-network.5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" Workload="ip--172--31--31--121-k8s-calico--kube--controllers--6947bb669--zq9km-eth0" Dec 13 14:17:34.538429 env[1814]: 2024-12-13 14:17:34.532 [INFO][5420] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:34.538429 env[1814]: 2024-12-13 14:17:34.534 [INFO][5414] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b" Dec 13 14:17:34.539731 env[1814]: time="2024-12-13T14:17:34.539409107Z" level=info msg="TearDown network for sandbox \"5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b\" successfully" Dec 13 14:17:34.546064 env[1814]: time="2024-12-13T14:17:34.545947491Z" level=info msg="RemovePodSandbox \"5974e62bebc3b7a04ca4be3e9b62bb6a59f06e570a6290c59b1d42999ec0343b\" returns successfully" Dec 13 14:17:34.546778 env[1814]: time="2024-12-13T14:17:34.546711755Z" level=info msg="StopPodSandbox for \"0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a\"" Dec 13 14:17:34.694397 env[1814]: 2024-12-13 14:17:34.616 [WARNING][5438] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--twvr5-eth0", GenerateName:"calico-apiserver-67c8d7c486-", Namespace:"calico-apiserver", SelfLink:"", UID:"dcf6065a-3a3d-4bb0-8d44-1814af22309d", ResourceVersion:"808", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67c8d7c486", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-121", ContainerID:"ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c", Pod:"calico-apiserver-67c8d7c486-twvr5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.94.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali512a23e0207", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:34.694397 env[1814]: 2024-12-13 14:17:34.617 [INFO][5438] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" Dec 13 14:17:34.694397 env[1814]: 2024-12-13 14:17:34.617 [INFO][5438] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" iface="eth0" netns="" Dec 13 14:17:34.694397 env[1814]: 2024-12-13 14:17:34.617 [INFO][5438] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" Dec 13 14:17:34.694397 env[1814]: 2024-12-13 14:17:34.617 [INFO][5438] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" Dec 13 14:17:34.694397 env[1814]: 2024-12-13 14:17:34.666 [INFO][5444] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" HandleID="k8s-pod-network.0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" Workload="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--twvr5-eth0" Dec 13 14:17:34.694397 env[1814]: 2024-12-13 14:17:34.667 [INFO][5444] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:34.694397 env[1814]: 2024-12-13 14:17:34.667 [INFO][5444] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:34.694397 env[1814]: 2024-12-13 14:17:34.685 [WARNING][5444] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" HandleID="k8s-pod-network.0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" Workload="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--twvr5-eth0" Dec 13 14:17:34.694397 env[1814]: 2024-12-13 14:17:34.685 [INFO][5444] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" HandleID="k8s-pod-network.0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" Workload="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--twvr5-eth0" Dec 13 14:17:34.694397 env[1814]: 2024-12-13 14:17:34.689 [INFO][5444] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:34.694397 env[1814]: 2024-12-13 14:17:34.692 [INFO][5438] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" Dec 13 14:17:34.695861 env[1814]: time="2024-12-13T14:17:34.695809967Z" level=info msg="TearDown network for sandbox \"0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a\" successfully" Dec 13 14:17:34.695999 env[1814]: time="2024-12-13T14:17:34.695965592Z" level=info msg="StopPodSandbox for \"0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a\" returns successfully" Dec 13 14:17:34.697135 env[1814]: time="2024-12-13T14:17:34.697056153Z" level=info msg="RemovePodSandbox for \"0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a\"" Dec 13 14:17:34.697361 env[1814]: time="2024-12-13T14:17:34.697300443Z" level=info msg="Forcibly stopping sandbox \"0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a\"" Dec 13 14:17:34.828249 env[1814]: 2024-12-13 14:17:34.767 [WARNING][5468] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--twvr5-eth0", GenerateName:"calico-apiserver-67c8d7c486-", Namespace:"calico-apiserver", SelfLink:"", UID:"dcf6065a-3a3d-4bb0-8d44-1814af22309d", ResourceVersion:"808", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67c8d7c486", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-121", ContainerID:"ffa29f243537a9182e75ee0604b8291df2f653ccae3464b9359f50fe55e6ae4c", Pod:"calico-apiserver-67c8d7c486-twvr5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.94.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali512a23e0207", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:34.828249 env[1814]: 2024-12-13 14:17:34.767 [INFO][5468] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" Dec 13 14:17:34.828249 env[1814]: 2024-12-13 14:17:34.767 [INFO][5468] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" iface="eth0" netns="" Dec 13 14:17:34.828249 env[1814]: 2024-12-13 14:17:34.767 [INFO][5468] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" Dec 13 14:17:34.828249 env[1814]: 2024-12-13 14:17:34.767 [INFO][5468] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" Dec 13 14:17:34.828249 env[1814]: 2024-12-13 14:17:34.807 [INFO][5475] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" HandleID="k8s-pod-network.0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" Workload="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--twvr5-eth0" Dec 13 14:17:34.828249 env[1814]: 2024-12-13 14:17:34.807 [INFO][5475] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:34.828249 env[1814]: 2024-12-13 14:17:34.808 [INFO][5475] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:34.828249 env[1814]: 2024-12-13 14:17:34.820 [WARNING][5475] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" HandleID="k8s-pod-network.0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" Workload="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--twvr5-eth0" Dec 13 14:17:34.828249 env[1814]: 2024-12-13 14:17:34.820 [INFO][5475] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" HandleID="k8s-pod-network.0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" Workload="ip--172--31--31--121-k8s-calico--apiserver--67c8d7c486--twvr5-eth0" Dec 13 14:17:34.828249 env[1814]: 2024-12-13 14:17:34.823 [INFO][5475] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:34.828249 env[1814]: 2024-12-13 14:17:34.825 [INFO][5468] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a" Dec 13 14:17:34.829203 env[1814]: time="2024-12-13T14:17:34.828288150Z" level=info msg="TearDown network for sandbox \"0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a\" successfully" Dec 13 14:17:34.834967 env[1814]: time="2024-12-13T14:17:34.834878361Z" level=info msg="RemovePodSandbox \"0438a51643097d53b0cb7f366cdff012e6c03fb0f8e5c246e6216b259b22028a\" returns successfully" Dec 13 14:17:34.836882 env[1814]: time="2024-12-13T14:17:34.836833348Z" level=info msg="StopPodSandbox for \"88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0\"" Dec 13 14:17:34.984515 env[1814]: 2024-12-13 14:17:34.902 [WARNING][5493] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--121-k8s-coredns--6f6b679f8f--4bslf-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"6133c088-e43c-4c97-acbe-a9a4e6ca0a6d", ResourceVersion:"817", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-121", ContainerID:"d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268", Pod:"coredns-6f6b679f8f-4bslf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.94.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic2011824c8e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:34.984515 env[1814]: 2024-12-13 14:17:34.903 [INFO][5493] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" Dec 13 14:17:34.984515 env[1814]: 2024-12-13 14:17:34.903 [INFO][5493] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" iface="eth0" netns="" Dec 13 14:17:34.984515 env[1814]: 2024-12-13 14:17:34.903 [INFO][5493] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" Dec 13 14:17:34.984515 env[1814]: 2024-12-13 14:17:34.903 [INFO][5493] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" Dec 13 14:17:34.984515 env[1814]: 2024-12-13 14:17:34.959 [INFO][5499] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" HandleID="k8s-pod-network.88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" Workload="ip--172--31--31--121-k8s-coredns--6f6b679f8f--4bslf-eth0" Dec 13 14:17:34.984515 env[1814]: 2024-12-13 14:17:34.959 [INFO][5499] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:34.984515 env[1814]: 2024-12-13 14:17:34.960 [INFO][5499] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:34.984515 env[1814]: 2024-12-13 14:17:34.975 [WARNING][5499] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" HandleID="k8s-pod-network.88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" Workload="ip--172--31--31--121-k8s-coredns--6f6b679f8f--4bslf-eth0" Dec 13 14:17:34.984515 env[1814]: 2024-12-13 14:17:34.975 [INFO][5499] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" HandleID="k8s-pod-network.88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" Workload="ip--172--31--31--121-k8s-coredns--6f6b679f8f--4bslf-eth0" Dec 13 14:17:34.984515 env[1814]: 2024-12-13 14:17:34.978 [INFO][5499] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:34.984515 env[1814]: 2024-12-13 14:17:34.982 [INFO][5493] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" Dec 13 14:17:34.985653 env[1814]: time="2024-12-13T14:17:34.985601807Z" level=info msg="TearDown network for sandbox \"88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0\" successfully" Dec 13 14:17:34.985869 env[1814]: time="2024-12-13T14:17:34.985833726Z" level=info msg="StopPodSandbox for \"88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0\" returns successfully" Dec 13 14:17:34.987198 env[1814]: time="2024-12-13T14:17:34.986997929Z" level=info msg="RemovePodSandbox for \"88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0\"" Dec 13 14:17:34.987495 env[1814]: time="2024-12-13T14:17:34.987355558Z" level=info msg="Forcibly stopping sandbox \"88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0\"" Dec 13 14:17:35.129204 env[1814]: 2024-12-13 14:17:35.057 [WARNING][5519] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--121-k8s-coredns--6f6b679f8f--4bslf-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"6133c088-e43c-4c97-acbe-a9a4e6ca0a6d", ResourceVersion:"817", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-121", ContainerID:"d205c2407dc3b6b58dfd7e3d77c5fd261d42fe9cfb6f9a97be374ac931a36268", Pod:"coredns-6f6b679f8f-4bslf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.94.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic2011824c8e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:35.129204 env[1814]: 2024-12-13 14:17:35.058 [INFO][5519] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" Dec 13 14:17:35.129204 env[1814]: 2024-12-13 14:17:35.058 [INFO][5519] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" iface="eth0" netns="" Dec 13 14:17:35.129204 env[1814]: 2024-12-13 14:17:35.058 [INFO][5519] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" Dec 13 14:17:35.129204 env[1814]: 2024-12-13 14:17:35.058 [INFO][5519] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" Dec 13 14:17:35.129204 env[1814]: 2024-12-13 14:17:35.099 [INFO][5526] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" HandleID="k8s-pod-network.88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" Workload="ip--172--31--31--121-k8s-coredns--6f6b679f8f--4bslf-eth0" Dec 13 14:17:35.129204 env[1814]: 2024-12-13 14:17:35.099 [INFO][5526] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:35.129204 env[1814]: 2024-12-13 14:17:35.099 [INFO][5526] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:35.129204 env[1814]: 2024-12-13 14:17:35.117 [WARNING][5526] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" HandleID="k8s-pod-network.88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" Workload="ip--172--31--31--121-k8s-coredns--6f6b679f8f--4bslf-eth0" Dec 13 14:17:35.129204 env[1814]: 2024-12-13 14:17:35.118 [INFO][5526] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" HandleID="k8s-pod-network.88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" Workload="ip--172--31--31--121-k8s-coredns--6f6b679f8f--4bslf-eth0" Dec 13 14:17:35.129204 env[1814]: 2024-12-13 14:17:35.122 [INFO][5526] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:35.129204 env[1814]: 2024-12-13 14:17:35.125 [INFO][5519] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0" Dec 13 14:17:35.129204 env[1814]: time="2024-12-13T14:17:35.127688268Z" level=info msg="TearDown network for sandbox \"88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0\" successfully" Dec 13 14:17:35.135422 env[1814]: time="2024-12-13T14:17:35.135352918Z" level=info msg="RemovePodSandbox \"88297e9194df395c94ddfcf4aac97b65910b1b8c0450d95a86f379f96e0ed2e0\" returns successfully" Dec 13 14:17:35.136053 env[1814]: time="2024-12-13T14:17:35.136009688Z" level=info msg="StopPodSandbox for \"d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9\"" Dec 13 14:17:35.288857 env[1814]: 2024-12-13 14:17:35.217 [WARNING][5544] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--121-k8s-coredns--6f6b679f8f--c65g5-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"a1601850-1168-45e1-aa6f-035031c5398b", ResourceVersion:"811", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-121", ContainerID:"da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200", Pod:"coredns-6f6b679f8f-c65g5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.94.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibe6a33d8242", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:35.288857 env[1814]: 2024-12-13 14:17:35.217 [INFO][5544] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" Dec 13 14:17:35.288857 env[1814]: 2024-12-13 14:17:35.217 [INFO][5544] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" iface="eth0" netns="" Dec 13 14:17:35.288857 env[1814]: 2024-12-13 14:17:35.217 [INFO][5544] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" Dec 13 14:17:35.288857 env[1814]: 2024-12-13 14:17:35.218 [INFO][5544] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" Dec 13 14:17:35.288857 env[1814]: 2024-12-13 14:17:35.265 [INFO][5550] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" HandleID="k8s-pod-network.d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" Workload="ip--172--31--31--121-k8s-coredns--6f6b679f8f--c65g5-eth0" Dec 13 14:17:35.288857 env[1814]: 2024-12-13 14:17:35.265 [INFO][5550] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:35.288857 env[1814]: 2024-12-13 14:17:35.265 [INFO][5550] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:35.288857 env[1814]: 2024-12-13 14:17:35.281 [WARNING][5550] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" HandleID="k8s-pod-network.d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" Workload="ip--172--31--31--121-k8s-coredns--6f6b679f8f--c65g5-eth0" Dec 13 14:17:35.288857 env[1814]: 2024-12-13 14:17:35.281 [INFO][5550] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" HandleID="k8s-pod-network.d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" Workload="ip--172--31--31--121-k8s-coredns--6f6b679f8f--c65g5-eth0" Dec 13 14:17:35.288857 env[1814]: 2024-12-13 14:17:35.284 [INFO][5550] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:35.288857 env[1814]: 2024-12-13 14:17:35.286 [INFO][5544] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" Dec 13 14:17:35.289944 env[1814]: time="2024-12-13T14:17:35.289892156Z" level=info msg="TearDown network for sandbox \"d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9\" successfully" Dec 13 14:17:35.290073 env[1814]: time="2024-12-13T14:17:35.290040005Z" level=info msg="StopPodSandbox for \"d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9\" returns successfully" Dec 13 14:17:35.290959 env[1814]: time="2024-12-13T14:17:35.290913983Z" level=info msg="RemovePodSandbox for \"d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9\"" Dec 13 14:17:35.291534 env[1814]: time="2024-12-13T14:17:35.291464243Z" level=info msg="Forcibly stopping sandbox \"d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9\"" Dec 13 14:17:35.432451 env[1814]: 2024-12-13 14:17:35.367 [WARNING][5569] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--31--121-k8s-coredns--6f6b679f8f--c65g5-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"a1601850-1168-45e1-aa6f-035031c5398b", ResourceVersion:"811", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 16, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-31-121", ContainerID:"da08260ba5163003c269e2ec663435775988d697c0737423b8598e52c9957200", Pod:"coredns-6f6b679f8f-c65g5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.94.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibe6a33d8242", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:17:35.432451 env[1814]: 2024-12-13 14:17:35.368 [INFO][5569] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" Dec 13 14:17:35.432451 env[1814]: 2024-12-13 14:17:35.368 [INFO][5569] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" iface="eth0" netns="" Dec 13 14:17:35.432451 env[1814]: 2024-12-13 14:17:35.368 [INFO][5569] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" Dec 13 14:17:35.432451 env[1814]: 2024-12-13 14:17:35.368 [INFO][5569] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" Dec 13 14:17:35.432451 env[1814]: 2024-12-13 14:17:35.408 [INFO][5575] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" HandleID="k8s-pod-network.d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" Workload="ip--172--31--31--121-k8s-coredns--6f6b679f8f--c65g5-eth0" Dec 13 14:17:35.432451 env[1814]: 2024-12-13 14:17:35.408 [INFO][5575] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:17:35.432451 env[1814]: 2024-12-13 14:17:35.408 [INFO][5575] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:17:35.432451 env[1814]: 2024-12-13 14:17:35.422 [WARNING][5575] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" HandleID="k8s-pod-network.d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" Workload="ip--172--31--31--121-k8s-coredns--6f6b679f8f--c65g5-eth0" Dec 13 14:17:35.432451 env[1814]: 2024-12-13 14:17:35.422 [INFO][5575] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" HandleID="k8s-pod-network.d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" Workload="ip--172--31--31--121-k8s-coredns--6f6b679f8f--c65g5-eth0" Dec 13 14:17:35.432451 env[1814]: 2024-12-13 14:17:35.426 [INFO][5575] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:17:35.432451 env[1814]: 2024-12-13 14:17:35.428 [INFO][5569] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9" Dec 13 14:17:35.433504 env[1814]: time="2024-12-13T14:17:35.433451621Z" level=info msg="TearDown network for sandbox \"d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9\" successfully" Dec 13 14:17:35.441061 env[1814]: time="2024-12-13T14:17:35.441002561Z" level=info msg="RemovePodSandbox \"d48de3bc6a31de8de2e71d1a24424f678b90958a8ad5873135a51eae48a96bb9\" returns successfully" Dec 13 14:17:36.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.31.121:22-139.178.89.65:51150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:36.108585 systemd[1]: Started sshd@9-172.31.31.121:22-139.178.89.65:51150.service. Dec 13 14:17:36.111223 kernel: kauditd_printk_skb: 40 callbacks suppressed Dec 13 14:17:36.111352 kernel: audit: type=1130 audit(1734099456.107:1343): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.31.121:22-139.178.89.65:51150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:36.298000 audit[5583]: USER_ACCT pid=5583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:36.299868 sshd[5583]: Accepted publickey for core from 139.178.89.65 port 51150 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:36.311270 kernel: audit: type=1101 audit(1734099456.298:1344): pid=5583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:36.311405 kernel: audit: type=1103 audit(1734099456.309:1345): pid=5583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:36.309000 audit[5583]: CRED_ACQ pid=5583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:36.312888 sshd[5583]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:36.325740 kernel: audit: type=1006 audit(1734099456.310:1346): pid=5583 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 14:17:36.310000 audit[5583]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe8c9eaf0 a2=3 a3=1 items=0 ppid=1 pid=5583 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:36.335742 kernel: audit: type=1300 audit(1734099456.310:1346): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe8c9eaf0 a2=3 a3=1 items=0 ppid=1 pid=5583 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:36.310000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:36.342220 kernel: audit: type=1327 audit(1734099456.310:1346): proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:36.341453 systemd[1]: Started session-10.scope. Dec 13 14:17:36.343255 systemd-logind[1803]: New session 10 of user core. Dec 13 14:17:36.353000 audit[5583]: USER_START pid=5583 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:36.356000 audit[5585]: CRED_ACQ pid=5585 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:36.374832 kernel: audit: type=1105 audit(1734099456.353:1347): pid=5583 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:36.374967 kernel: audit: type=1103 audit(1734099456.356:1348): pid=5585 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:36.609491 sshd[5583]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:36.610000 audit[5583]: USER_END pid=5583 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:36.610000 audit[5583]: CRED_DISP pid=5583 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:36.623282 kernel: audit: type=1106 audit(1734099456.610:1349): pid=5583 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:36.623534 systemd[1]: sshd@9-172.31.31.121:22-139.178.89.65:51150.service: Deactivated successfully. Dec 13 14:17:36.624811 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 14:17:36.633156 kernel: audit: type=1104 audit(1734099456.610:1350): pid=5583 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:36.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.31.121:22-139.178.89.65:51150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:36.634042 systemd-logind[1803]: Session 10 logged out. Waiting for processes to exit. Dec 13 14:17:36.635653 systemd-logind[1803]: Removed session 10. Dec 13 14:17:41.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.31.121:22-139.178.89.65:51402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:41.639491 systemd[1]: Started sshd@10-172.31.31.121:22-139.178.89.65:51402.service. Dec 13 14:17:41.641784 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:17:41.641841 kernel: audit: type=1130 audit(1734099461.639:1352): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.31.121:22-139.178.89.65:51402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:41.816000 audit[5619]: USER_ACCT pid=5619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:41.821400 sshd[5619]: Accepted publickey for core from 139.178.89.65 port 51402 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:41.824609 sshd[5619]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:41.822000 audit[5619]: CRED_ACQ pid=5619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:41.834291 kernel: audit: type=1101 audit(1734099461.816:1353): pid=5619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:41.834449 kernel: audit: type=1103 audit(1734099461.822:1354): pid=5619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:41.840073 kernel: audit: type=1006 audit(1734099461.822:1355): pid=5619 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 14:17:41.822000 audit[5619]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffda9de480 a2=3 a3=1 items=0 ppid=1 pid=5619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:41.850229 kernel: audit: type=1300 audit(1734099461.822:1355): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffda9de480 a2=3 a3=1 items=0 ppid=1 pid=5619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:41.822000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:41.853638 kernel: audit: type=1327 audit(1734099461.822:1355): proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:41.858937 systemd-logind[1803]: New session 11 of user core. Dec 13 14:17:41.859894 systemd[1]: Started session-11.scope. Dec 13 14:17:41.870000 audit[5619]: USER_START pid=5619 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:41.872000 audit[5621]: CRED_ACQ pid=5621 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:41.888993 kernel: audit: type=1105 audit(1734099461.870:1356): pid=5619 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:41.889087 kernel: audit: type=1103 audit(1734099461.872:1357): pid=5621 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:42.120977 sshd[5619]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:42.122000 audit[5619]: USER_END pid=5619 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:42.122000 audit[5619]: CRED_DISP pid=5619 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:42.142335 kernel: audit: type=1106 audit(1734099462.122:1358): pid=5619 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:42.142475 kernel: audit: type=1104 audit(1734099462.122:1359): pid=5619 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:42.134049 systemd[1]: sshd@10-172.31.31.121:22-139.178.89.65:51402.service: Deactivated successfully. Dec 13 14:17:42.135452 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 14:17:42.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.31.121:22-139.178.89.65:51402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:42.144324 systemd-logind[1803]: Session 11 logged out. Waiting for processes to exit. Dec 13 14:17:42.154770 systemd[1]: Started sshd@11-172.31.31.121:22-139.178.89.65:51414.service. Dec 13 14:17:42.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.31.121:22-139.178.89.65:51414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:42.156836 systemd-logind[1803]: Removed session 11. Dec 13 14:17:42.330000 audit[5631]: USER_ACCT pid=5631 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:42.330782 sshd[5631]: Accepted publickey for core from 139.178.89.65 port 51414 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:42.332000 audit[5631]: CRED_ACQ pid=5631 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:42.332000 audit[5631]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffccbbd00 a2=3 a3=1 items=0 ppid=1 pid=5631 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:42.332000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:42.334005 sshd[5631]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:42.343795 systemd[1]: Started session-12.scope. Dec 13 14:17:42.344688 systemd-logind[1803]: New session 12 of user core. Dec 13 14:17:42.354000 audit[5631]: USER_START pid=5631 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:42.357000 audit[5633]: CRED_ACQ pid=5633 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:42.698198 sshd[5631]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:42.700000 audit[5631]: USER_END pid=5631 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:42.700000 audit[5631]: CRED_DISP pid=5631 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:42.704391 systemd-logind[1803]: Session 12 logged out. Waiting for processes to exit. Dec 13 14:17:42.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.31.121:22-139.178.89.65:51414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:42.704998 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 14:17:42.706319 systemd[1]: sshd@11-172.31.31.121:22-139.178.89.65:51414.service: Deactivated successfully. Dec 13 14:17:42.711557 systemd-logind[1803]: Removed session 12. Dec 13 14:17:42.732336 systemd[1]: Started sshd@12-172.31.31.121:22-139.178.89.65:51416.service. Dec 13 14:17:42.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.31.121:22-139.178.89.65:51416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:42.916000 audit[5642]: USER_ACCT pid=5642 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:42.916547 sshd[5642]: Accepted publickey for core from 139.178.89.65 port 51416 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:42.918000 audit[5642]: CRED_ACQ pid=5642 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:42.918000 audit[5642]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffef3fbb40 a2=3 a3=1 items=0 ppid=1 pid=5642 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:42.918000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:42.919539 sshd[5642]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:42.928321 systemd-logind[1803]: New session 13 of user core. Dec 13 14:17:42.928647 systemd[1]: Started session-13.scope. Dec 13 14:17:42.941000 audit[5642]: USER_START pid=5642 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:42.944000 audit[5644]: CRED_ACQ pid=5644 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:43.187489 sshd[5642]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:43.189000 audit[5642]: USER_END pid=5642 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:43.190000 audit[5642]: CRED_DISP pid=5642 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:43.192857 systemd[1]: sshd@12-172.31.31.121:22-139.178.89.65:51416.service: Deactivated successfully. Dec 13 14:17:43.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.31.121:22-139.178.89.65:51416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:43.194487 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 14:17:43.195944 systemd-logind[1803]: Session 13 logged out. Waiting for processes to exit. Dec 13 14:17:43.198329 systemd-logind[1803]: Removed session 13. Dec 13 14:17:46.339036 systemd[1]: run-containerd-runc-k8s.io-e6b4aabc4628cd21c1e09efb3e02deedfb32f6db3522fd2df449a90ebf687186-runc.TX1KOA.mount: Deactivated successfully. Dec 13 14:17:48.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.31.121:22-139.178.89.65:49052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:48.217065 systemd[1]: Started sshd@13-172.31.31.121:22-139.178.89.65:49052.service. Dec 13 14:17:48.219815 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 14:17:48.219950 kernel: audit: type=1130 audit(1734099468.216:1379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.31.121:22-139.178.89.65:49052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:48.401000 audit[5678]: USER_ACCT pid=5678 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:48.402719 sshd[5678]: Accepted publickey for core from 139.178.89.65 port 49052 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:48.412000 audit[5678]: CRED_ACQ pid=5678 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:48.414608 sshd[5678]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:48.422526 kernel: audit: type=1101 audit(1734099468.401:1380): pid=5678 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:48.422860 kernel: audit: type=1103 audit(1734099468.412:1381): pid=5678 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:48.422931 kernel: audit: type=1006 audit(1734099468.412:1382): pid=5678 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Dec 13 14:17:48.412000 audit[5678]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcbb48ed0 a2=3 a3=1 items=0 ppid=1 pid=5678 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:48.438317 kernel: audit: type=1300 audit(1734099468.412:1382): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcbb48ed0 a2=3 a3=1 items=0 ppid=1 pid=5678 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:48.412000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:48.444328 kernel: audit: type=1327 audit(1734099468.412:1382): proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:48.444544 systemd-logind[1803]: New session 14 of user core. Dec 13 14:17:48.444825 systemd[1]: Started session-14.scope. Dec 13 14:17:48.454000 audit[5678]: USER_START pid=5678 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:48.465000 audit[5680]: CRED_ACQ pid=5680 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:48.475842 kernel: audit: type=1105 audit(1734099468.454:1383): pid=5678 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:48.475940 kernel: audit: type=1103 audit(1734099468.465:1384): pid=5680 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:48.776698 sshd[5678]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:48.777000 audit[5678]: USER_END pid=5678 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:48.784781 systemd[1]: sshd@13-172.31.31.121:22-139.178.89.65:49052.service: Deactivated successfully. Dec 13 14:17:48.786303 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 14:17:48.787682 systemd-logind[1803]: Session 14 logged out. Waiting for processes to exit. Dec 13 14:17:48.790322 systemd-logind[1803]: Removed session 14. Dec 13 14:17:48.777000 audit[5678]: CRED_DISP pid=5678 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:48.799601 kernel: audit: type=1106 audit(1734099468.777:1385): pid=5678 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:48.799786 kernel: audit: type=1104 audit(1734099468.777:1386): pid=5678 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:48.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.31.121:22-139.178.89.65:49052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:49.649190 systemd[1]: run-containerd-runc-k8s.io-21724008f72d115a0b4549392a5b3757006a4bce965b6debbc437d7565a68e81-runc.js5ZeR.mount: Deactivated successfully. Dec 13 14:17:53.812925 systemd[1]: Started sshd@14-172.31.31.121:22-139.178.89.65:49064.service. Dec 13 14:17:53.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.31.121:22-139.178.89.65:49064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:53.816702 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:17:53.816958 kernel: audit: type=1130 audit(1734099473.813:1388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.31.121:22-139.178.89.65:49064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:53.995000 audit[5714]: USER_ACCT pid=5714 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:53.997044 sshd[5714]: Accepted publickey for core from 139.178.89.65 port 49064 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:54.007000 audit[5714]: CRED_ACQ pid=5714 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:54.010009 sshd[5714]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:54.017755 kernel: audit: type=1101 audit(1734099473.995:1389): pid=5714 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:54.017929 kernel: audit: type=1103 audit(1734099474.007:1390): pid=5714 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:54.024939 kernel: audit: type=1006 audit(1734099474.008:1391): pid=5714 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 14:17:54.008000 audit[5714]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc3c9a090 a2=3 a3=1 items=0 ppid=1 pid=5714 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:54.034156 systemd-logind[1803]: New session 15 of user core. Dec 13 14:17:54.037354 kernel: audit: type=1300 audit(1734099474.008:1391): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc3c9a090 a2=3 a3=1 items=0 ppid=1 pid=5714 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:54.037436 kernel: audit: type=1327 audit(1734099474.008:1391): proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:54.008000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:54.035860 systemd[1]: Started session-15.scope. Dec 13 14:17:54.056000 audit[5714]: USER_START pid=5714 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:54.068000 audit[5716]: CRED_ACQ pid=5716 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:54.078453 kernel: audit: type=1105 audit(1734099474.056:1392): pid=5714 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:54.078645 kernel: audit: type=1103 audit(1734099474.068:1393): pid=5716 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:54.342669 sshd[5714]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:54.343000 audit[5714]: USER_END pid=5714 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:54.347731 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 14:17:54.348974 systemd[1]: sshd@14-172.31.31.121:22-139.178.89.65:49064.service: Deactivated successfully. Dec 13 14:17:54.357375 systemd-logind[1803]: Session 15 logged out. Waiting for processes to exit. Dec 13 14:17:54.344000 audit[5714]: CRED_DISP pid=5714 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:54.368125 kernel: audit: type=1106 audit(1734099474.343:1394): pid=5714 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:54.368254 kernel: audit: type=1104 audit(1734099474.344:1395): pid=5714 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:54.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.31.121:22-139.178.89.65:49064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:54.369363 systemd-logind[1803]: Removed session 15. Dec 13 14:17:58.757523 kubelet[2977]: I1213 14:17:58.757415 2977 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:17:58.801283 kubelet[2977]: I1213 14:17:58.801182 2977 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-bw5cn" podStartSLOduration=61.469195306 podStartE2EDuration="1m11.801086704s" podCreationTimestamp="2024-12-13 14:16:47 +0000 UTC" firstStartedPulling="2024-12-13 14:17:17.745437937 +0000 UTC m=+44.412946554" lastFinishedPulling="2024-12-13 14:17:28.077329335 +0000 UTC m=+54.744837952" observedRunningTime="2024-12-13 14:17:29.181409204 +0000 UTC m=+55.848917941" watchObservedRunningTime="2024-12-13 14:17:58.801086704 +0000 UTC m=+85.468595357" Dec 13 14:17:58.888534 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:17:58.888697 kernel: audit: type=1325 audit(1734099478.880:1397): table=filter:113 family=2 entries=9 op=nft_register_rule pid=5732 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:58.880000 audit[5732]: NETFILTER_CFG table=filter:113 family=2 entries=9 op=nft_register_rule pid=5732 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:58.880000 audit[5732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffec78c4a0 a2=0 a3=1 items=0 ppid=3137 pid=5732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.880000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:58.903325 kernel: audit: type=1300 audit(1734099478.880:1397): arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffec78c4a0 a2=0 a3=1 items=0 ppid=3137 pid=5732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.910149 kernel: audit: type=1327 audit(1734099478.880:1397): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:58.912000 audit[5732]: NETFILTER_CFG table=nat:114 family=2 entries=27 op=nft_register_chain pid=5732 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:58.912000 audit[5732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffec78c4a0 a2=0 a3=1 items=0 ppid=3137 pid=5732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.934143 kernel: audit: type=1325 audit(1734099478.912:1398): table=nat:114 family=2 entries=27 op=nft_register_chain pid=5732 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:58.934313 kernel: audit: type=1300 audit(1734099478.912:1398): arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffec78c4a0 a2=0 a3=1 items=0 ppid=3137 pid=5732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.912000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:58.940809 kernel: audit: type=1327 audit(1734099478.912:1398): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:59.372698 systemd[1]: Started sshd@15-172.31.31.121:22-139.178.89.65:59228.service. Dec 13 14:17:59.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.31.121:22-139.178.89.65:59228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.390318 kernel: audit: type=1130 audit(1734099479.374:1399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.31.121:22-139.178.89.65:59228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.554000 audit[5734]: USER_ACCT pid=5734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:59.555700 sshd[5734]: Accepted publickey for core from 139.178.89.65 port 59228 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:59.567168 kernel: audit: type=1101 audit(1734099479.554:1400): pid=5734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:59.568404 sshd[5734]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:59.566000 audit[5734]: CRED_ACQ pid=5734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:59.585155 kernel: audit: type=1103 audit(1734099479.566:1401): pid=5734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:59.585325 kernel: audit: type=1006 audit(1734099479.566:1402): pid=5734 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 14:17:59.566000 audit[5734]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcdb789f0 a2=3 a3=1 items=0 ppid=1 pid=5734 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:59.566000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:59.593405 systemd-logind[1803]: New session 16 of user core. Dec 13 14:17:59.595845 systemd[1]: Started session-16.scope. Dec 13 14:17:59.611000 audit[5734]: USER_START pid=5734 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:59.614000 audit[5737]: CRED_ACQ pid=5737 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:59.942249 sshd[5734]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:59.942000 audit[5734]: USER_END pid=5734 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:59.943000 audit[5734]: CRED_DISP pid=5734 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:59.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.31.121:22-139.178.89.65:59228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.947616 systemd[1]: sshd@15-172.31.31.121:22-139.178.89.65:59228.service: Deactivated successfully. Dec 13 14:17:59.949126 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 14:17:59.950701 systemd-logind[1803]: Session 16 logged out. Waiting for processes to exit. Dec 13 14:17:59.951889 kubelet[2977]: I1213 14:17:59.951850 2977 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:17:59.958355 systemd-logind[1803]: Removed session 16. Dec 13 14:18:00.141000 audit[5748]: NETFILTER_CFG table=filter:115 family=2 entries=8 op=nft_register_rule pid=5748 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:00.141000 audit[5748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffe4530590 a2=0 a3=1 items=0 ppid=3137 pid=5748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:00.141000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:00.151000 audit[5748]: NETFILTER_CFG table=nat:116 family=2 entries=34 op=nft_register_chain pid=5748 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:00.151000 audit[5748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffe4530590 a2=0 a3=1 items=0 ppid=3137 pid=5748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:00.151000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:04.973414 systemd[1]: Started sshd@16-172.31.31.121:22-139.178.89.65:59240.service. Dec 13 14:18:04.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.31.121:22-139.178.89.65:59240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:04.976427 kernel: kauditd_printk_skb: 13 callbacks suppressed Dec 13 14:18:04.976574 kernel: audit: type=1130 audit(1734099484.973:1410): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.31.121:22-139.178.89.65:59240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:05.178762 sshd[5751]: Accepted publickey for core from 139.178.89.65 port 59240 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:18:05.177000 audit[5751]: USER_ACCT pid=5751 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:05.190078 sshd[5751]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:05.187000 audit[5751]: CRED_ACQ pid=5751 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:05.202147 kernel: audit: type=1101 audit(1734099485.177:1411): pid=5751 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:05.202318 kernel: audit: type=1103 audit(1734099485.187:1412): pid=5751 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:05.213655 kernel: audit: type=1006 audit(1734099485.187:1413): pid=5751 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 14:18:05.213805 systemd-logind[1803]: New session 17 of user core. Dec 13 14:18:05.187000 audit[5751]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd26f99e0 a2=3 a3=1 items=0 ppid=1 pid=5751 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:05.216863 systemd[1]: Started session-17.scope. Dec 13 14:18:05.225523 kernel: audit: type=1300 audit(1734099485.187:1413): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd26f99e0 a2=3 a3=1 items=0 ppid=1 pid=5751 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:05.187000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:05.233599 kernel: audit: type=1327 audit(1734099485.187:1413): proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:05.237000 audit[5751]: USER_START pid=5751 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:05.250000 audit[5753]: CRED_ACQ pid=5753 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:05.261391 kernel: audit: type=1105 audit(1734099485.237:1414): pid=5751 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:05.261573 kernel: audit: type=1103 audit(1734099485.250:1415): pid=5753 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:05.569648 sshd[5751]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:05.571000 audit[5751]: USER_END pid=5751 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:05.577738 systemd-logind[1803]: Session 17 logged out. Waiting for processes to exit. Dec 13 14:18:05.572000 audit[5751]: CRED_DISP pid=5751 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:05.586018 systemd[1]: sshd@16-172.31.31.121:22-139.178.89.65:59240.service: Deactivated successfully. Dec 13 14:18:05.587447 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 14:18:05.594866 kernel: audit: type=1106 audit(1734099485.571:1416): pid=5751 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:05.595034 kernel: audit: type=1104 audit(1734099485.572:1417): pid=5751 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:05.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.31.121:22-139.178.89.65:59240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:05.604912 systemd-logind[1803]: Removed session 17. Dec 13 14:18:05.616412 systemd[1]: Started sshd@17-172.31.31.121:22-139.178.89.65:59252.service. Dec 13 14:18:05.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.31.121:22-139.178.89.65:59252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:05.782000 audit[5764]: USER_ACCT pid=5764 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:05.784180 sshd[5764]: Accepted publickey for core from 139.178.89.65 port 59252 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:18:05.785000 audit[5764]: CRED_ACQ pid=5764 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:05.785000 audit[5764]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffffea6170 a2=3 a3=1 items=0 ppid=1 pid=5764 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:05.785000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:05.787456 sshd[5764]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:05.797214 systemd[1]: Started session-18.scope. Dec 13 14:18:05.797953 systemd-logind[1803]: New session 18 of user core. Dec 13 14:18:05.805000 audit[5764]: USER_START pid=5764 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:05.808000 audit[5766]: CRED_ACQ pid=5766 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:06.372233 sshd[5764]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:06.372000 audit[5764]: USER_END pid=5764 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:06.373000 audit[5764]: CRED_DISP pid=5764 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:06.377252 systemd[1]: sshd@17-172.31.31.121:22-139.178.89.65:59252.service: Deactivated successfully. Dec 13 14:18:06.378631 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 14:18:06.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.31.121:22-139.178.89.65:59252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:06.380021 systemd-logind[1803]: Session 18 logged out. Waiting for processes to exit. Dec 13 14:18:06.381937 systemd-logind[1803]: Removed session 18. Dec 13 14:18:06.403542 systemd[1]: Started sshd@18-172.31.31.121:22-139.178.89.65:59266.service. Dec 13 14:18:06.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.31.121:22-139.178.89.65:59266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:06.584798 sshd[5773]: Accepted publickey for core from 139.178.89.65 port 59266 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:18:06.583000 audit[5773]: USER_ACCT pid=5773 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:06.586000 audit[5773]: CRED_ACQ pid=5773 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:06.586000 audit[5773]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe7284ac0 a2=3 a3=1 items=0 ppid=1 pid=5773 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:06.586000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:06.588312 sshd[5773]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:06.597361 systemd-logind[1803]: New session 19 of user core. Dec 13 14:18:06.599615 systemd[1]: Started session-19.scope. Dec 13 14:18:06.609000 audit[5773]: USER_START pid=5773 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:06.612000 audit[5775]: CRED_ACQ pid=5775 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:09.863000 audit[5786]: NETFILTER_CFG table=filter:117 family=2 entries=20 op=nft_register_rule pid=5786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:09.863000 audit[5786]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffd6812180 a2=0 a3=1 items=0 ppid=3137 pid=5786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:09.863000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:09.869000 audit[5786]: NETFILTER_CFG table=nat:118 family=2 entries=22 op=nft_register_rule pid=5786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:09.869000 audit[5786]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffd6812180 a2=0 a3=1 items=0 ppid=3137 pid=5786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:09.869000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:09.885675 sshd[5773]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:09.888000 audit[5773]: USER_END pid=5773 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:09.888000 audit[5773]: CRED_DISP pid=5773 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:09.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.31.121:22-139.178.89.65:59266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:09.893369 systemd[1]: sshd@18-172.31.31.121:22-139.178.89.65:59266.service: Deactivated successfully. Dec 13 14:18:09.894779 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 14:18:09.895074 systemd[1]: session-19.scope: Consumed 1.029s CPU time. Dec 13 14:18:09.897493 systemd-logind[1803]: Session 19 logged out. Waiting for processes to exit. Dec 13 14:18:09.899890 systemd-logind[1803]: Removed session 19. Dec 13 14:18:09.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.31.121:22-139.178.89.65:55148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:09.914225 systemd[1]: Started sshd@19-172.31.31.121:22-139.178.89.65:55148.service. Dec 13 14:18:09.944000 audit[5792]: NETFILTER_CFG table=filter:119 family=2 entries=32 op=nft_register_rule pid=5792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:09.944000 audit[5792]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffc624a8c0 a2=0 a3=1 items=0 ppid=3137 pid=5792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:09.944000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:09.956000 audit[5792]: NETFILTER_CFG table=nat:120 family=2 entries=22 op=nft_register_rule pid=5792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:09.956000 audit[5792]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffc624a8c0 a2=0 a3=1 items=0 ppid=3137 pid=5792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:09.956000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:10.091050 kernel: kauditd_printk_skb: 36 callbacks suppressed Dec 13 14:18:10.091210 kernel: audit: type=1101 audit(1734099490.085:1442): pid=5790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:10.085000 audit[5790]: USER_ACCT pid=5790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:10.090812 sshd[5790]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:10.091802 sshd[5790]: Accepted publickey for core from 139.178.89.65 port 55148 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:18:10.087000 audit[5790]: CRED_ACQ pid=5790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:10.106881 kernel: audit: type=1103 audit(1734099490.087:1443): pid=5790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:10.113349 kernel: audit: type=1006 audit(1734099490.087:1444): pid=5790 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Dec 13 14:18:10.087000 audit[5790]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd1d9d9e0 a2=3 a3=1 items=0 ppid=1 pid=5790 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:10.123069 kernel: audit: type=1300 audit(1734099490.087:1444): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd1d9d9e0 a2=3 a3=1 items=0 ppid=1 pid=5790 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:10.087000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:10.129891 kernel: audit: type=1327 audit(1734099490.087:1444): proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:10.129816 systemd-logind[1803]: New session 20 of user core. Dec 13 14:18:10.130491 systemd[1]: Started session-20.scope. Dec 13 14:18:10.138000 audit[5790]: USER_START pid=5790 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:10.141000 audit[5793]: CRED_ACQ pid=5793 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:10.158303 kernel: audit: type=1105 audit(1734099490.138:1445): pid=5790 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:10.158465 kernel: audit: type=1103 audit(1734099490.141:1446): pid=5793 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:10.670853 sshd[5790]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:10.672000 audit[5790]: USER_END pid=5790 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:10.676409 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 14:18:10.677640 systemd[1]: sshd@19-172.31.31.121:22-139.178.89.65:55148.service: Deactivated successfully. Dec 13 14:18:10.672000 audit[5790]: CRED_DISP pid=5790 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:10.685213 systemd-logind[1803]: Session 20 logged out. Waiting for processes to exit. Dec 13 14:18:10.694237 kernel: audit: type=1106 audit(1734099490.672:1447): pid=5790 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:10.694374 kernel: audit: type=1104 audit(1734099490.672:1448): pid=5790 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:10.694419 kernel: audit: type=1131 audit(1734099490.676:1449): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.31.121:22-139.178.89.65:55148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:10.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.31.121:22-139.178.89.65:55148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:10.703372 systemd[1]: Started sshd@20-172.31.31.121:22-139.178.89.65:55158.service. Dec 13 14:18:10.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.31.121:22-139.178.89.65:55158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:10.708552 systemd-logind[1803]: Removed session 20. Dec 13 14:18:10.872000 audit[5803]: USER_ACCT pid=5803 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:10.873888 sshd[5803]: Accepted publickey for core from 139.178.89.65 port 55158 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:18:10.874000 audit[5803]: CRED_ACQ pid=5803 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:10.874000 audit[5803]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcfe4d010 a2=3 a3=1 items=0 ppid=1 pid=5803 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:10.874000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:10.876636 sshd[5803]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:10.885456 systemd[1]: Started session-21.scope. Dec 13 14:18:10.886764 systemd-logind[1803]: New session 21 of user core. Dec 13 14:18:10.894000 audit[5803]: USER_START pid=5803 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:10.897000 audit[5805]: CRED_ACQ pid=5805 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:11.140051 sshd[5803]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:11.141000 audit[5803]: USER_END pid=5803 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:11.142000 audit[5803]: CRED_DISP pid=5803 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:11.145827 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 14:18:11.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.31.121:22-139.178.89.65:55158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:11.147717 systemd[1]: sshd@20-172.31.31.121:22-139.178.89.65:55158.service: Deactivated successfully. Dec 13 14:18:11.149001 systemd-logind[1803]: Session 21 logged out. Waiting for processes to exit. Dec 13 14:18:11.150954 systemd-logind[1803]: Removed session 21. Dec 13 14:18:16.182878 kernel: kauditd_printk_skb: 11 callbacks suppressed Dec 13 14:18:16.183034 kernel: audit: type=1130 audit(1734099496.171:1459): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.31.121:22-139.178.89.65:55166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:16.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.31.121:22-139.178.89.65:55166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:16.172706 systemd[1]: Started sshd@21-172.31.31.121:22-139.178.89.65:55166.service. Dec 13 14:18:16.349000 audit[5815]: USER_ACCT pid=5815 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:16.359941 sshd[5815]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:16.361965 sshd[5815]: Accepted publickey for core from 139.178.89.65 port 55166 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:18:16.355000 audit[5815]: CRED_ACQ pid=5815 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:16.374111 kernel: audit: type=1101 audit(1734099496.349:1460): pid=5815 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:16.374229 kernel: audit: type=1103 audit(1734099496.355:1461): pid=5815 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:16.379218 systemd[1]: Started session-22.scope. Dec 13 14:18:16.380688 systemd-logind[1803]: New session 22 of user core. Dec 13 14:18:16.387730 kernel: audit: type=1006 audit(1734099496.355:1462): pid=5815 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Dec 13 14:18:16.355000 audit[5815]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc4c65d20 a2=3 a3=1 items=0 ppid=1 pid=5815 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:16.402474 kernel: audit: type=1300 audit(1734099496.355:1462): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc4c65d20 a2=3 a3=1 items=0 ppid=1 pid=5815 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:16.355000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:16.406498 kernel: audit: type=1327 audit(1734099496.355:1462): proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:16.402000 audit[5815]: USER_START pid=5815 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:16.418174 kernel: audit: type=1105 audit(1734099496.402:1463): pid=5815 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:16.417000 audit[5836]: CRED_ACQ pid=5836 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:16.428000 kernel: audit: type=1103 audit(1734099496.417:1464): pid=5836 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:16.660231 sshd[5815]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:16.663000 audit[5815]: USER_END pid=5815 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:16.674000 audit[5815]: CRED_DISP pid=5815 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:16.677766 systemd[1]: sshd@21-172.31.31.121:22-139.178.89.65:55166.service: Deactivated successfully. Dec 13 14:18:16.679076 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 14:18:16.682973 systemd-logind[1803]: Session 22 logged out. Waiting for processes to exit. Dec 13 14:18:16.685663 kernel: audit: type=1106 audit(1734099496.663:1465): pid=5815 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:16.685813 kernel: audit: type=1104 audit(1734099496.674:1466): pid=5815 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:16.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.31.121:22-139.178.89.65:55166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:16.684924 systemd-logind[1803]: Removed session 22. Dec 13 14:18:18.088000 audit[5850]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=5850 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:18.088000 audit[5850]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffd9061f00 a2=0 a3=1 items=0 ppid=3137 pid=5850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:18.088000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:18.099000 audit[5850]: NETFILTER_CFG table=nat:122 family=2 entries=106 op=nft_register_chain pid=5850 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:18.099000 audit[5850]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffd9061f00 a2=0 a3=1 items=0 ppid=3137 pid=5850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:18.099000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:21.696128 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:18:21.696307 kernel: audit: type=1130 audit(1734099501.692:1470): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.31.121:22-139.178.89.65:56764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:21.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.31.121:22-139.178.89.65:56764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:21.693336 systemd[1]: Started sshd@22-172.31.31.121:22-139.178.89.65:56764.service. Dec 13 14:18:21.868180 sshd[5874]: Accepted publickey for core from 139.178.89.65 port 56764 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:18:21.866000 audit[5874]: USER_ACCT pid=5874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:21.876000 audit[5874]: CRED_ACQ pid=5874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:21.887144 kernel: audit: type=1101 audit(1734099501.866:1471): pid=5874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:21.887279 kernel: audit: type=1103 audit(1734099501.876:1472): pid=5874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:21.878589 sshd[5874]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:21.892838 kernel: audit: type=1006 audit(1734099501.876:1473): pid=5874 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 14:18:21.876000 audit[5874]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffee7963c0 a2=3 a3=1 items=0 ppid=1 pid=5874 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:21.902781 kernel: audit: type=1300 audit(1734099501.876:1473): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffee7963c0 a2=3 a3=1 items=0 ppid=1 pid=5874 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:21.876000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:21.907047 kernel: audit: type=1327 audit(1734099501.876:1473): proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:21.914210 systemd-logind[1803]: New session 23 of user core. Dec 13 14:18:21.915544 systemd[1]: Started session-23.scope. Dec 13 14:18:21.923000 audit[5874]: USER_START pid=5874 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:21.936349 kernel: audit: type=1105 audit(1734099501.923:1474): pid=5874 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:21.935000 audit[5876]: CRED_ACQ pid=5876 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:21.946133 kernel: audit: type=1103 audit(1734099501.935:1475): pid=5876 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:22.175369 sshd[5874]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:22.176000 audit[5874]: USER_END pid=5874 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:22.189188 systemd[1]: sshd@22-172.31.31.121:22-139.178.89.65:56764.service: Deactivated successfully. Dec 13 14:18:22.190867 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 14:18:22.176000 audit[5874]: CRED_DISP pid=5874 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:22.200404 kernel: audit: type=1106 audit(1734099502.176:1476): pid=5874 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:22.200505 kernel: audit: type=1104 audit(1734099502.176:1477): pid=5874 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:22.200791 systemd-logind[1803]: Session 23 logged out. Waiting for processes to exit. Dec 13 14:18:22.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.31.121:22-139.178.89.65:56764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:22.202943 systemd-logind[1803]: Removed session 23. Dec 13 14:18:23.431000 audit[5019]: AVC avc: denied { watch } for pid=5019 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_17_01.3740626422/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c884 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c215,c884 tclass=file permissive=0 Dec 13 14:18:23.431000 audit[5019]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40017ad5e0 a2=fc6 a3=0 items=0 ppid=4375 pid=5019 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c884 key=(null) Dec 13 14:18:23.431000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:18:27.206831 systemd[1]: Started sshd@23-172.31.31.121:22-139.178.89.65:56780.service. Dec 13 14:18:27.217821 kernel: kauditd_printk_skb: 4 callbacks suppressed Dec 13 14:18:27.217971 kernel: audit: type=1130 audit(1734099507.206:1480): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.31.121:22-139.178.89.65:56780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.31.121:22-139.178.89.65:56780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.378000 audit[5886]: USER_ACCT pid=5886 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:27.381325 sshd[5886]: Accepted publickey for core from 139.178.89.65 port 56780 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:18:27.389000 audit[5886]: CRED_ACQ pid=5886 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:27.391911 sshd[5886]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:27.399810 kernel: audit: type=1101 audit(1734099507.378:1481): pid=5886 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:27.399959 kernel: audit: type=1103 audit(1734099507.389:1482): pid=5886 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:27.400017 kernel: audit: type=1006 audit(1734099507.390:1483): pid=5886 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 14:18:27.390000 audit[5886]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdfb8b960 a2=3 a3=1 items=0 ppid=1 pid=5886 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:27.414861 kernel: audit: type=1300 audit(1734099507.390:1483): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdfb8b960 a2=3 a3=1 items=0 ppid=1 pid=5886 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:27.390000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:27.418602 kernel: audit: type=1327 audit(1734099507.390:1483): proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:27.426968 systemd-logind[1803]: New session 24 of user core. Dec 13 14:18:27.428954 systemd[1]: Started session-24.scope. Dec 13 14:18:27.439000 audit[5886]: USER_START pid=5886 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:27.442000 audit[5888]: CRED_ACQ pid=5888 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:27.459026 kernel: audit: type=1105 audit(1734099507.439:1484): pid=5886 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:27.459203 kernel: audit: type=1103 audit(1734099507.442:1485): pid=5888 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:27.738451 sshd[5886]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:27.739000 audit[5886]: USER_END pid=5886 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:27.743317 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 14:18:27.744554 systemd[1]: sshd@23-172.31.31.121:22-139.178.89.65:56780.service: Deactivated successfully. Dec 13 14:18:27.752543 systemd-logind[1803]: Session 24 logged out. Waiting for processes to exit. Dec 13 14:18:27.754264 systemd-logind[1803]: Removed session 24. Dec 13 14:18:27.739000 audit[5886]: CRED_DISP pid=5886 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:27.765606 kernel: audit: type=1106 audit(1734099507.739:1486): pid=5886 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:27.765788 kernel: audit: type=1104 audit(1734099507.739:1487): pid=5886 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:27.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.31.121:22-139.178.89.65:56780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:28.956000 audit[2591]: AVC avc: denied { watch } for pid=2591 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:28.956000 audit[2591]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7b a1=4007c40d40 a2=fc6 a3=0 items=0 ppid=2420 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 key=(null) Dec 13 14:18:28.956000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E313231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:18:28.957000 audit[2591]: AVC avc: denied { watch } for pid=2591 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7330 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:28.957000 audit[2591]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7b a1=4015c64d80 a2=fc6 a3=0 items=0 ppid=2420 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 key=(null) Dec 13 14:18:28.957000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E313231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:18:28.968000 audit[2591]: AVC avc: denied { watch } for pid=2591 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=7328 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:28.968000 audit[2591]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7a a1=4015c642d0 a2=fc6 a3=0 items=0 ppid=2420 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 key=(null) Dec 13 14:18:28.968000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E313231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:18:29.198000 audit[2591]: AVC avc: denied { watch } for pid=2591 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=7332 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:29.198000 audit[2591]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7a a1=40168d1770 a2=fc6 a3=0 items=0 ppid=2420 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 key=(null) Dec 13 14:18:29.198000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E313231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:18:29.228000 audit[2591]: AVC avc: denied { watch } for pid=2591 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7330 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:29.228000 audit[2591]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7a a1=4008bf15c0 a2=fc6 a3=0 items=0 ppid=2420 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 key=(null) Dec 13 14:18:29.228000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E313231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:18:29.228000 audit[2591]: AVC avc: denied { watch } for pid=2591 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:29.228000 audit[2591]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7a a1=400e7463c0 a2=fc6 a3=0 items=0 ppid=2420 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c605,c707 key=(null) Dec 13 14:18:29.228000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E33312E313231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:18:29.294000 audit[2577]: AVC avc: denied { watch } for pid=2577 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7330 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:29.294000 audit[2577]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001076000 a2=fc6 a3=0 items=0 ppid=2401 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 key=(null) Dec 13 14:18:29.294000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:18:29.294000 audit[2577]: AVC avc: denied { watch } for pid=2577 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:29.294000 audit[2577]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002bcd2c0 a2=fc6 a3=0 items=0 ppid=2401 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 key=(null) Dec 13 14:18:29.294000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:18:31.437000 audit[5193]: AVC avc: denied { watch } for pid=5193 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_17_01.3172771795/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c111,c509 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c111,c509 tclass=file permissive=0 Dec 13 14:18:31.437000 audit[5193]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40011d24c0 a2=fc6 a3=0 items=0 ppid=4776 pid=5193 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c111,c509 key=(null) Dec 13 14:18:31.437000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:18:32.764760 systemd[1]: Started sshd@24-172.31.31.121:22-139.178.89.65:56218.service. Dec 13 14:18:32.770134 kernel: kauditd_printk_skb: 28 callbacks suppressed Dec 13 14:18:32.770248 kernel: audit: type=1130 audit(1734099512.764:1498): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.31.121:22-139.178.89.65:56218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:32.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.31.121:22-139.178.89.65:56218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:32.933000 audit[5898]: USER_ACCT pid=5898 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:32.934573 sshd[5898]: Accepted publickey for core from 139.178.89.65 port 56218 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:18:32.937681 sshd[5898]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:32.935000 audit[5898]: CRED_ACQ pid=5898 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:32.953469 kernel: audit: type=1101 audit(1734099512.933:1499): pid=5898 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:32.953606 kernel: audit: type=1103 audit(1734099512.935:1500): pid=5898 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:32.953704 kernel: audit: type=1006 audit(1734099512.935:1501): pid=5898 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 14:18:32.935000 audit[5898]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff2868100 a2=3 a3=1 items=0 ppid=1 pid=5898 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:32.969036 kernel: audit: type=1300 audit(1734099512.935:1501): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff2868100 a2=3 a3=1 items=0 ppid=1 pid=5898 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:32.976923 systemd-logind[1803]: New session 25 of user core. Dec 13 14:18:32.978247 systemd[1]: Started session-25.scope. Dec 13 14:18:32.935000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:32.982962 kernel: audit: type=1327 audit(1734099512.935:1501): proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:32.991000 audit[5898]: USER_START pid=5898 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:33.006174 kernel: audit: type=1105 audit(1734099512.991:1502): pid=5898 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:33.005000 audit[5900]: CRED_ACQ pid=5900 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:33.019161 kernel: audit: type=1103 audit(1734099513.005:1503): pid=5900 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:33.280175 sshd[5898]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:33.281000 audit[5898]: USER_END pid=5898 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:33.293790 systemd[1]: sshd@24-172.31.31.121:22-139.178.89.65:56218.service: Deactivated successfully. Dec 13 14:18:33.295165 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 14:18:33.299442 systemd-logind[1803]: Session 25 logged out. Waiting for processes to exit. Dec 13 14:18:33.302161 systemd-logind[1803]: Removed session 25. Dec 13 14:18:33.281000 audit[5898]: CRED_DISP pid=5898 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:33.316408 kernel: audit: type=1106 audit(1734099513.281:1504): pid=5898 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:33.316593 kernel: audit: type=1104 audit(1734099513.281:1505): pid=5898 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:33.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.31.121:22-139.178.89.65:56218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:33.311000 audit[2577]: AVC avc: denied { watch } for pid=2577 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:33.311000 audit[2577]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002c34a20 a2=fc6 a3=0 items=0 ppid=2401 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 key=(null) Dec 13 14:18:33.311000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:18:33.315000 audit[2577]: AVC avc: denied { watch } for pid=2577 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:33.315000 audit[2577]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002bcd4e0 a2=fc6 a3=0 items=0 ppid=2401 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 key=(null) Dec 13 14:18:33.315000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:18:33.316000 audit[2577]: AVC avc: denied { watch } for pid=2577 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:33.316000 audit[2577]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002bcd680 a2=fc6 a3=0 items=0 ppid=2401 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 key=(null) Dec 13 14:18:33.316000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:18:33.317000 audit[2577]: AVC avc: denied { watch } for pid=2577 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:33.317000 audit[2577]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002c34bc0 a2=fc6 a3=0 items=0 ppid=2401 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 key=(null) Dec 13 14:18:33.317000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:18:38.309759 systemd[1]: Started sshd@25-172.31.31.121:22-139.178.89.65:38300.service. Dec 13 14:18:38.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.31.121:22-139.178.89.65:38300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:38.312642 kernel: kauditd_printk_skb: 13 callbacks suppressed Dec 13 14:18:38.312757 kernel: audit: type=1130 audit(1734099518.309:1511): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.31.121:22-139.178.89.65:38300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:38.489000 audit[5919]: USER_ACCT pid=5919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:38.491234 sshd[5919]: Accepted publickey for core from 139.178.89.65 port 38300 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:18:38.494743 sshd[5919]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:38.489000 audit[5919]: CRED_ACQ pid=5919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:38.507356 systemd[1]: Started session-26.scope. Dec 13 14:18:38.509135 kernel: audit: type=1101 audit(1734099518.489:1512): pid=5919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:38.509352 kernel: audit: type=1103 audit(1734099518.489:1513): pid=5919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:38.509415 kernel: audit: type=1006 audit(1734099518.489:1514): pid=5919 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 14:18:38.508800 systemd-logind[1803]: New session 26 of user core. Dec 13 14:18:38.515048 kernel: audit: type=1300 audit(1734099518.489:1514): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd3a62160 a2=3 a3=1 items=0 ppid=1 pid=5919 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:38.489000 audit[5919]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd3a62160 a2=3 a3=1 items=0 ppid=1 pid=5919 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:38.489000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:38.528692 kernel: audit: type=1327 audit(1734099518.489:1514): proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:38.518000 audit[5919]: USER_START pid=5919 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:38.539780 kernel: audit: type=1105 audit(1734099518.518:1515): pid=5919 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:38.539865 kernel: audit: type=1103 audit(1734099518.528:1516): pid=5921 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:38.528000 audit[5921]: CRED_ACQ pid=5921 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:38.758255 sshd[5919]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:38.760000 audit[5919]: USER_END pid=5919 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:38.765148 systemd-logind[1803]: Session 26 logged out. Waiting for processes to exit. Dec 13 14:18:38.767644 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 14:18:38.771160 systemd-logind[1803]: Removed session 26. Dec 13 14:18:38.760000 audit[5919]: CRED_DISP pid=5919 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:38.772544 systemd[1]: sshd@25-172.31.31.121:22-139.178.89.65:38300.service: Deactivated successfully. Dec 13 14:18:38.781356 kernel: audit: type=1106 audit(1734099518.760:1517): pid=5919 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:38.781639 kernel: audit: type=1104 audit(1734099518.760:1518): pid=5919 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:38.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.31.121:22-139.178.89.65:38300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:39.341776 systemd[1]: run-containerd-runc-k8s.io-e6b4aabc4628cd21c1e09efb3e02deedfb32f6db3522fd2df449a90ebf687186-runc.fgd9yM.mount: Deactivated successfully. Dec 13 14:18:43.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.31.121:22-139.178.89.65:38304 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:43.787273 systemd[1]: Started sshd@26-172.31.31.121:22-139.178.89.65:38304.service. Dec 13 14:18:43.789421 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:18:43.790845 kernel: audit: type=1130 audit(1734099523.786:1520): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.31.121:22-139.178.89.65:38304 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:43.960000 audit[5953]: USER_ACCT pid=5953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:43.962411 sshd[5953]: Accepted publickey for core from 139.178.89.65 port 38304 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:18:43.978278 kernel: audit: type=1101 audit(1734099523.960:1521): pid=5953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:43.981000 audit[5953]: CRED_ACQ pid=5953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:43.983679 sshd[5953]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:43.993589 systemd[1]: Started session-27.scope. Dec 13 14:18:43.997718 kernel: audit: type=1103 audit(1734099523.981:1522): pid=5953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:43.997851 kernel: audit: type=1006 audit(1734099523.981:1523): pid=5953 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Dec 13 14:18:43.997901 kernel: audit: type=1300 audit(1734099523.981:1523): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd43c790 a2=3 a3=1 items=0 ppid=1 pid=5953 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:43.981000 audit[5953]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd43c790 a2=3 a3=1 items=0 ppid=1 pid=5953 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:43.996732 systemd-logind[1803]: New session 27 of user core. Dec 13 14:18:44.007512 kernel: audit: type=1327 audit(1734099523.981:1523): proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:43.981000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:44.007000 audit[5953]: USER_START pid=5953 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:44.021672 kernel: audit: type=1105 audit(1734099524.007:1524): pid=5953 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:44.021000 audit[5955]: CRED_ACQ pid=5955 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:44.030949 kernel: audit: type=1103 audit(1734099524.021:1525): pid=5955 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:44.251972 sshd[5953]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:44.252000 audit[5953]: USER_END pid=5953 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:44.257273 systemd-logind[1803]: Session 27 logged out. Waiting for processes to exit. Dec 13 14:18:44.258604 systemd[1]: session-27.scope: Deactivated successfully. Dec 13 14:18:44.259662 systemd[1]: sshd@26-172.31.31.121:22-139.178.89.65:38304.service: Deactivated successfully. Dec 13 14:18:44.263506 systemd-logind[1803]: Removed session 27. Dec 13 14:18:44.252000 audit[5953]: CRED_DISP pid=5953 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:44.273447 kernel: audit: type=1106 audit(1734099524.252:1526): pid=5953 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:44.273538 kernel: audit: type=1104 audit(1734099524.252:1527): pid=5953 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:44.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.31.121:22-139.178.89.65:38304 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:46.334999 systemd[1]: run-containerd-runc-k8s.io-e6b4aabc4628cd21c1e09efb3e02deedfb32f6db3522fd2df449a90ebf687186-runc.Wt1x57.mount: Deactivated successfully. Dec 13 14:18:49.281555 systemd[1]: Started sshd@27-172.31.31.121:22-139.178.89.65:37484.service. Dec 13 14:18:49.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.31.121:22-139.178.89.65:37484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:49.285121 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:18:49.285246 kernel: audit: type=1130 audit(1734099529.280:1529): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.31.121:22-139.178.89.65:37484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:49.460000 audit[5996]: USER_ACCT pid=5996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:49.462283 sshd[5996]: Accepted publickey for core from 139.178.89.65 port 37484 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:18:49.465790 sshd[5996]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:49.463000 audit[5996]: CRED_ACQ pid=5996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:49.481013 kernel: audit: type=1101 audit(1734099529.460:1530): pid=5996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:49.481169 kernel: audit: type=1103 audit(1734099529.463:1531): pid=5996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:49.481238 kernel: audit: type=1006 audit(1734099529.463:1532): pid=5996 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Dec 13 14:18:49.480346 systemd[1]: Started session-28.scope. Dec 13 14:18:49.481652 systemd-logind[1803]: New session 28 of user core. Dec 13 14:18:49.463000 audit[5996]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffc22a6e0 a2=3 a3=1 items=0 ppid=1 pid=5996 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:49.495267 kernel: audit: type=1300 audit(1734099529.463:1532): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffc22a6e0 a2=3 a3=1 items=0 ppid=1 pid=5996 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:49.495421 kernel: audit: type=1327 audit(1734099529.463:1532): proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:49.463000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:49.495000 audit[5996]: USER_START pid=5996 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:49.510230 kernel: audit: type=1105 audit(1734099529.495:1533): pid=5996 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:49.509000 audit[5998]: CRED_ACQ pid=5998 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:49.519346 kernel: audit: type=1103 audit(1734099529.509:1534): pid=5998 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:49.644362 systemd[1]: run-containerd-runc-k8s.io-21724008f72d115a0b4549392a5b3757006a4bce965b6debbc437d7565a68e81-runc.ASdCqB.mount: Deactivated successfully. Dec 13 14:18:49.813289 sshd[5996]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:49.814000 audit[5996]: USER_END pid=5996 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:49.816000 audit[5996]: CRED_DISP pid=5996 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:49.827383 kernel: audit: type=1106 audit(1734099529.814:1535): pid=5996 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:49.827275 systemd[1]: sshd@27-172.31.31.121:22-139.178.89.65:37484.service: Deactivated successfully. Dec 13 14:18:49.828562 systemd[1]: session-28.scope: Deactivated successfully. Dec 13 14:18:49.838353 kernel: audit: type=1104 audit(1734099529.816:1536): pid=5996 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:18:49.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.31.121:22-139.178.89.65:37484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:49.837496 systemd-logind[1803]: Session 28 logged out. Waiting for processes to exit. Dec 13 14:18:49.839897 systemd-logind[1803]: Removed session 28. Dec 13 14:19:03.967541 systemd[1]: cri-containerd-779371e56ff5405a8955328075913a7604daf89fe17fe5fd7735e5e0589cfadd.scope: Deactivated successfully. Dec 13 14:19:03.968135 systemd[1]: cri-containerd-779371e56ff5405a8955328075913a7604daf89fe17fe5fd7735e5e0589cfadd.scope: Consumed 9.909s CPU time. Dec 13 14:19:03.966000 audit: BPF prog-id=114 op=UNLOAD Dec 13 14:19:03.970545 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:19:03.970651 kernel: audit: type=1334 audit(1734099543.966:1538): prog-id=114 op=UNLOAD Dec 13 14:19:03.975000 audit: BPF prog-id=117 op=UNLOAD Dec 13 14:19:03.980146 kernel: audit: type=1334 audit(1734099543.975:1539): prog-id=117 op=UNLOAD Dec 13 14:19:04.013834 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-779371e56ff5405a8955328075913a7604daf89fe17fe5fd7735e5e0589cfadd-rootfs.mount: Deactivated successfully. Dec 13 14:19:04.018810 env[1814]: time="2024-12-13T14:19:04.018745292Z" level=info msg="shim disconnected" id=779371e56ff5405a8955328075913a7604daf89fe17fe5fd7735e5e0589cfadd Dec 13 14:19:04.019518 env[1814]: time="2024-12-13T14:19:04.019465327Z" level=warning msg="cleaning up after shim disconnected" id=779371e56ff5405a8955328075913a7604daf89fe17fe5fd7735e5e0589cfadd namespace=k8s.io Dec 13 14:19:04.019650 env[1814]: time="2024-12-13T14:19:04.019619803Z" level=info msg="cleaning up dead shim" Dec 13 14:19:04.033487 env[1814]: time="2024-12-13T14:19:04.033430211Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:19:04Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6043 runtime=io.containerd.runc.v2\n" Dec 13 14:19:04.448388 kubelet[2977]: I1213 14:19:04.448305 2977 scope.go:117] "RemoveContainer" containerID="779371e56ff5405a8955328075913a7604daf89fe17fe5fd7735e5e0589cfadd" Dec 13 14:19:04.451995 env[1814]: time="2024-12-13T14:19:04.451922353Z" level=info msg="CreateContainer within sandbox \"70fc2f7fb9f4cf7bf238119e991b6a350ba0d6586fa80a625b306449a5470f4c\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Dec 13 14:19:04.486438 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2324023355.mount: Deactivated successfully. Dec 13 14:19:04.498212 env[1814]: time="2024-12-13T14:19:04.498117257Z" level=info msg="CreateContainer within sandbox \"70fc2f7fb9f4cf7bf238119e991b6a350ba0d6586fa80a625b306449a5470f4c\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"3fb9d4d71d4d03fed0848ded4d4e0ee95ebfc5c6fc8164bd9ebb96991d906fb8\"" Dec 13 14:19:04.499220 env[1814]: time="2024-12-13T14:19:04.499149460Z" level=info msg="StartContainer for \"3fb9d4d71d4d03fed0848ded4d4e0ee95ebfc5c6fc8164bd9ebb96991d906fb8\"" Dec 13 14:19:04.511701 systemd[1]: cri-containerd-c7f21b708565ace2974165dbc43e1b7ded8b6e13090066b3ff97ae959b1a08f7.scope: Deactivated successfully. Dec 13 14:19:04.514259 systemd[1]: cri-containerd-c7f21b708565ace2974165dbc43e1b7ded8b6e13090066b3ff97ae959b1a08f7.scope: Consumed 5.460s CPU time. Dec 13 14:19:04.515000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:19:04.515000 audit: BPF prog-id=93 op=UNLOAD Dec 13 14:19:04.521696 kernel: audit: type=1334 audit(1734099544.515:1540): prog-id=77 op=UNLOAD Dec 13 14:19:04.521851 kernel: audit: type=1334 audit(1734099544.515:1541): prog-id=93 op=UNLOAD Dec 13 14:19:04.556659 systemd[1]: Started cri-containerd-3fb9d4d71d4d03fed0848ded4d4e0ee95ebfc5c6fc8164bd9ebb96991d906fb8.scope. Dec 13 14:19:04.570915 env[1814]: time="2024-12-13T14:19:04.570846067Z" level=info msg="shim disconnected" id=c7f21b708565ace2974165dbc43e1b7ded8b6e13090066b3ff97ae959b1a08f7 Dec 13 14:19:04.571082 env[1814]: time="2024-12-13T14:19:04.570915283Z" level=warning msg="cleaning up after shim disconnected" id=c7f21b708565ace2974165dbc43e1b7ded8b6e13090066b3ff97ae959b1a08f7 namespace=k8s.io Dec 13 14:19:04.571082 env[1814]: time="2024-12-13T14:19:04.570938143Z" level=info msg="cleaning up dead shim" Dec 13 14:19:04.591375 env[1814]: time="2024-12-13T14:19:04.591313945Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:19:04Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6083 runtime=io.containerd.runc.v2\n" Dec 13 14:19:04.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.623073 kernel: audit: type=1400 audit(1734099544.607:1542): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.623189 kernel: audit: type=1400 audit(1734099544.607:1543): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.631433 kernel: audit: type=1400 audit(1734099544.607:1544): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.638449 kernel: audit: type=1400 audit(1734099544.607:1545): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.646338 kernel: audit: type=1400 audit(1734099544.607:1546): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.655408 kernel: audit: type=1400 audit(1734099544.607:1547): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.615000 audit: BPF prog-id=208 op=LOAD Dec 13 14:19:04.622000 audit[6067]: AVC avc: denied { bpf } for pid=6067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.622000 audit[6067]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3045 pid=6067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:04.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366623964346437316434643033666564303834386465643464346530 Dec 13 14:19:04.622000 audit[6067]: AVC avc: denied { perfmon } for pid=6067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.622000 audit[6067]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3045 pid=6067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:04.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366623964346437316434643033666564303834386465643464346530 Dec 13 14:19:04.622000 audit[6067]: AVC avc: denied { bpf } for pid=6067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.622000 audit[6067]: AVC avc: denied { bpf } for pid=6067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.622000 audit[6067]: AVC avc: denied { bpf } for pid=6067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.622000 audit[6067]: AVC avc: denied { perfmon } for pid=6067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.622000 audit[6067]: AVC avc: denied { perfmon } for pid=6067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.622000 audit[6067]: AVC avc: denied { perfmon } for pid=6067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.622000 audit[6067]: AVC avc: denied { perfmon } for pid=6067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.622000 audit[6067]: AVC avc: denied { perfmon } for pid=6067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.622000 audit[6067]: AVC avc: denied { bpf } for pid=6067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.622000 audit[6067]: AVC avc: denied { bpf } for pid=6067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.622000 audit: BPF prog-id=209 op=LOAD Dec 13 14:19:04.622000 audit[6067]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3045 pid=6067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:04.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366623964346437316434643033666564303834386465643464346530 Dec 13 14:19:04.622000 audit[6067]: AVC avc: denied { bpf } for pid=6067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.622000 audit[6067]: AVC avc: denied { bpf } for pid=6067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.622000 audit[6067]: AVC avc: denied { perfmon } for pid=6067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.622000 audit[6067]: AVC avc: denied { perfmon } for pid=6067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.622000 audit[6067]: AVC avc: denied { perfmon } for pid=6067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.622000 audit[6067]: AVC avc: denied { perfmon } for pid=6067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.622000 audit[6067]: AVC avc: denied { perfmon } for pid=6067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.622000 audit[6067]: AVC avc: denied { bpf } for pid=6067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.622000 audit[6067]: AVC avc: denied { bpf } for pid=6067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.622000 audit: BPF prog-id=210 op=LOAD Dec 13 14:19:04.622000 audit[6067]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3045 pid=6067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:04.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366623964346437316434643033666564303834386465643464346530 Dec 13 14:19:04.623000 audit: BPF prog-id=210 op=UNLOAD Dec 13 14:19:04.623000 audit: BPF prog-id=209 op=UNLOAD Dec 13 14:19:04.623000 audit[6067]: AVC avc: denied { bpf } for pid=6067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.623000 audit[6067]: AVC avc: denied { bpf } for pid=6067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.623000 audit[6067]: AVC avc: denied { bpf } for pid=6067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.623000 audit[6067]: AVC avc: denied { perfmon } for pid=6067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.623000 audit[6067]: AVC avc: denied { perfmon } for pid=6067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.623000 audit[6067]: AVC avc: denied { perfmon } for pid=6067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.623000 audit[6067]: AVC avc: denied { perfmon } for pid=6067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.623000 audit[6067]: AVC avc: denied { perfmon } for pid=6067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.623000 audit[6067]: AVC avc: denied { bpf } for pid=6067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.623000 audit[6067]: AVC avc: denied { bpf } for pid=6067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:04.623000 audit: BPF prog-id=211 op=LOAD Dec 13 14:19:04.623000 audit[6067]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3045 pid=6067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:04.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366623964346437316434643033666564303834386465643464346530 Dec 13 14:19:04.679630 env[1814]: time="2024-12-13T14:19:04.679554161Z" level=info msg="StartContainer for \"3fb9d4d71d4d03fed0848ded4d4e0ee95ebfc5c6fc8164bd9ebb96991d906fb8\" returns successfully" Dec 13 14:19:05.017373 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c7f21b708565ace2974165dbc43e1b7ded8b6e13090066b3ff97ae959b1a08f7-rootfs.mount: Deactivated successfully. Dec 13 14:19:05.455401 kubelet[2977]: I1213 14:19:05.455349 2977 scope.go:117] "RemoveContainer" containerID="c7f21b708565ace2974165dbc43e1b7ded8b6e13090066b3ff97ae959b1a08f7" Dec 13 14:19:05.461117 env[1814]: time="2024-12-13T14:19:05.461022271Z" level=info msg="CreateContainer within sandbox \"b19daee948e0ef3df64d19694c4e495a3a38cc18662099d848b7948a96e7faa4\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Dec 13 14:19:05.489810 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3156563632.mount: Deactivated successfully. Dec 13 14:19:05.500089 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1285927172.mount: Deactivated successfully. Dec 13 14:19:05.501603 env[1814]: time="2024-12-13T14:19:05.501539362Z" level=info msg="CreateContainer within sandbox \"b19daee948e0ef3df64d19694c4e495a3a38cc18662099d848b7948a96e7faa4\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"78423c01889756d54c18daaee9497112c2f418a4e5d0da5ec2a65de77fd54360\"" Dec 13 14:19:05.503437 env[1814]: time="2024-12-13T14:19:05.503330659Z" level=info msg="StartContainer for \"78423c01889756d54c18daaee9497112c2f418a4e5d0da5ec2a65de77fd54360\"" Dec 13 14:19:05.541055 systemd[1]: Started cri-containerd-78423c01889756d54c18daaee9497112c2f418a4e5d0da5ec2a65de77fd54360.scope. Dec 13 14:19:05.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.580000 audit: BPF prog-id=212 op=LOAD Dec 13 14:19:05.581000 audit[6123]: AVC avc: denied { bpf } for pid=6123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.581000 audit[6123]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2401 pid=6123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:05.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738343233633031383839373536643534633138646161656539343937 Dec 13 14:19:05.582000 audit[6123]: AVC avc: denied { perfmon } for pid=6123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.582000 audit[6123]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2401 pid=6123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:05.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738343233633031383839373536643534633138646161656539343937 Dec 13 14:19:05.584000 audit[6123]: AVC avc: denied { bpf } for pid=6123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.584000 audit[6123]: AVC avc: denied { bpf } for pid=6123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.584000 audit[6123]: AVC avc: denied { bpf } for pid=6123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.584000 audit[6123]: AVC avc: denied { perfmon } for pid=6123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.584000 audit[6123]: AVC avc: denied { perfmon } for pid=6123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.584000 audit[6123]: AVC avc: denied { perfmon } for pid=6123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.584000 audit[6123]: AVC avc: denied { perfmon } for pid=6123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.584000 audit[6123]: AVC avc: denied { perfmon } for pid=6123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.584000 audit[6123]: AVC avc: denied { bpf } for pid=6123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.584000 audit[6123]: AVC avc: denied { bpf } for pid=6123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.584000 audit: BPF prog-id=213 op=LOAD Dec 13 14:19:05.584000 audit[6123]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2401 pid=6123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:05.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738343233633031383839373536643534633138646161656539343937 Dec 13 14:19:05.585000 audit[6123]: AVC avc: denied { bpf } for pid=6123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.585000 audit[6123]: AVC avc: denied { bpf } for pid=6123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.585000 audit[6123]: AVC avc: denied { perfmon } for pid=6123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.585000 audit[6123]: AVC avc: denied { perfmon } for pid=6123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.585000 audit[6123]: AVC avc: denied { perfmon } for pid=6123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.585000 audit[6123]: AVC avc: denied { perfmon } for pid=6123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.585000 audit[6123]: AVC avc: denied { perfmon } for pid=6123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.585000 audit[6123]: AVC avc: denied { bpf } for pid=6123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.585000 audit[6123]: AVC avc: denied { bpf } for pid=6123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.585000 audit: BPF prog-id=214 op=LOAD Dec 13 14:19:05.585000 audit[6123]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2401 pid=6123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:05.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738343233633031383839373536643534633138646161656539343937 Dec 13 14:19:05.587000 audit: BPF prog-id=214 op=UNLOAD Dec 13 14:19:05.587000 audit: BPF prog-id=213 op=UNLOAD Dec 13 14:19:05.587000 audit[6123]: AVC avc: denied { bpf } for pid=6123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.587000 audit[6123]: AVC avc: denied { bpf } for pid=6123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.587000 audit[6123]: AVC avc: denied { bpf } for pid=6123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.587000 audit[6123]: AVC avc: denied { perfmon } for pid=6123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.587000 audit[6123]: AVC avc: denied { perfmon } for pid=6123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.587000 audit[6123]: AVC avc: denied { perfmon } for pid=6123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.587000 audit[6123]: AVC avc: denied { perfmon } for pid=6123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.587000 audit[6123]: AVC avc: denied { perfmon } for pid=6123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.587000 audit[6123]: AVC avc: denied { bpf } for pid=6123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.587000 audit[6123]: AVC avc: denied { bpf } for pid=6123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:05.587000 audit: BPF prog-id=215 op=LOAD Dec 13 14:19:05.587000 audit[6123]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2401 pid=6123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:05.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738343233633031383839373536643534633138646161656539343937 Dec 13 14:19:05.637465 env[1814]: time="2024-12-13T14:19:05.637394997Z" level=info msg="StartContainer for \"78423c01889756d54c18daaee9497112c2f418a4e5d0da5ec2a65de77fd54360\" returns successfully" Dec 13 14:19:07.488316 kubelet[2977]: E1213 14:19:07.488242 2977 controller.go:195] "Failed to update lease" err="Put \"https://172.31.31.121:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-31-121?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 13 14:19:08.618000 audit[6133]: AVC avc: denied { watch } for pid=6133 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=7326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:19:08.618000 audit[6133]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000364040 a2=fc6 a3=0 items=0 ppid=2401 pid=6133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 key=(null) Dec 13 14:19:08.618000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:19:08.619000 audit[6133]: AVC avc: denied { watch } for pid=6133 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7330 scontext=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:19:08.619000 audit[6133]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000367c80 a2=fc6 a3=0 items=0 ppid=2401 pid=6133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c212,c581 key=(null) Dec 13 14:19:08.619000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:19:08.884240 systemd[1]: cri-containerd-29b32031dcb9e018467f3ac5392dab5839833031d310a75ce7cccc62234597f3.scope: Deactivated successfully. Dec 13 14:19:08.884847 systemd[1]: cri-containerd-29b32031dcb9e018467f3ac5392dab5839833031d310a75ce7cccc62234597f3.scope: Consumed 3.360s CPU time. Dec 13 14:19:08.887000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:19:08.887000 audit: BPF prog-id=102 op=UNLOAD Dec 13 14:19:08.925090 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-29b32031dcb9e018467f3ac5392dab5839833031d310a75ce7cccc62234597f3-rootfs.mount: Deactivated successfully. Dec 13 14:19:08.928054 env[1814]: time="2024-12-13T14:19:08.927972428Z" level=info msg="shim disconnected" id=29b32031dcb9e018467f3ac5392dab5839833031d310a75ce7cccc62234597f3 Dec 13 14:19:08.928710 env[1814]: time="2024-12-13T14:19:08.928050764Z" level=warning msg="cleaning up after shim disconnected" id=29b32031dcb9e018467f3ac5392dab5839833031d310a75ce7cccc62234597f3 namespace=k8s.io Dec 13 14:19:08.928710 env[1814]: time="2024-12-13T14:19:08.928077488Z" level=info msg="cleaning up dead shim" Dec 13 14:19:08.945329 env[1814]: time="2024-12-13T14:19:08.945228501Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:19:08Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6161 runtime=io.containerd.runc.v2\n" Dec 13 14:19:09.473141 kubelet[2977]: I1213 14:19:09.472850 2977 scope.go:117] "RemoveContainer" containerID="29b32031dcb9e018467f3ac5392dab5839833031d310a75ce7cccc62234597f3" Dec 13 14:19:09.485772 env[1814]: time="2024-12-13T14:19:09.485705371Z" level=info msg="CreateContainer within sandbox \"c73ab37547341129f9e412adea10fd6db3b284ca2d0018803b7f31788bde5333\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Dec 13 14:19:09.514471 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount487185420.mount: Deactivated successfully. Dec 13 14:19:09.527163 env[1814]: time="2024-12-13T14:19:09.527074898Z" level=info msg="CreateContainer within sandbox \"c73ab37547341129f9e412adea10fd6db3b284ca2d0018803b7f31788bde5333\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"9a5cbc521f3ee7629fbb9fc4dfd59d03b80ff32651bca3f70cb4789b0e879c30\"" Dec 13 14:19:09.528150 env[1814]: time="2024-12-13T14:19:09.528017737Z" level=info msg="StartContainer for \"9a5cbc521f3ee7629fbb9fc4dfd59d03b80ff32651bca3f70cb4789b0e879c30\"" Dec 13 14:19:09.569790 systemd[1]: Started cri-containerd-9a5cbc521f3ee7629fbb9fc4dfd59d03b80ff32651bca3f70cb4789b0e879c30.scope. Dec 13 14:19:09.609800 kernel: kauditd_printk_skb: 116 callbacks suppressed Dec 13 14:19:09.609970 kernel: audit: type=1400 audit(1734099549.599:1582): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.617282 kernel: audit: type=1400 audit(1734099549.605:1583): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.624476 kernel: audit: type=1400 audit(1734099549.605:1584): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.631938 kernel: audit: type=1400 audit(1734099549.605:1585): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.639289 kernel: audit: type=1400 audit(1734099549.605:1586): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.646658 kernel: audit: type=1400 audit(1734099549.605:1587): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.657042 kernel: audit: type=1400 audit(1734099549.605:1588): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.666162 kernel: audit: type=1400 audit(1734099549.605:1589): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.674165 kernel: audit: type=1400 audit(1734099549.605:1590): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.682149 kernel: audit: type=1400 audit(1734099549.608:1591): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.608000 audit: BPF prog-id=216 op=LOAD Dec 13 14:19:09.609000 audit[6182]: AVC avc: denied { bpf } for pid=6182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.609000 audit[6182]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2437 pid=6182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:09.609000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961356362633532316633656537363239666262396663346466643539 Dec 13 14:19:09.609000 audit[6182]: AVC avc: denied { perfmon } for pid=6182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.609000 audit[6182]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2437 pid=6182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:09.609000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961356362633532316633656537363239666262396663346466643539 Dec 13 14:19:09.609000 audit[6182]: AVC avc: denied { bpf } for pid=6182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.609000 audit[6182]: AVC avc: denied { bpf } for pid=6182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.609000 audit[6182]: AVC avc: denied { bpf } for pid=6182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.609000 audit[6182]: AVC avc: denied { perfmon } for pid=6182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.609000 audit[6182]: AVC avc: denied { perfmon } for pid=6182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.609000 audit[6182]: AVC avc: denied { perfmon } for pid=6182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.609000 audit[6182]: AVC avc: denied { perfmon } for pid=6182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.609000 audit[6182]: AVC avc: denied { perfmon } for pid=6182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.609000 audit[6182]: AVC avc: denied { bpf } for pid=6182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.609000 audit[6182]: AVC avc: denied { bpf } for pid=6182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.609000 audit: BPF prog-id=217 op=LOAD Dec 13 14:19:09.609000 audit[6182]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2437 pid=6182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:09.609000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961356362633532316633656537363239666262396663346466643539 Dec 13 14:19:09.616000 audit[6182]: AVC avc: denied { bpf } for pid=6182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.616000 audit[6182]: AVC avc: denied { bpf } for pid=6182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.616000 audit[6182]: AVC avc: denied { perfmon } for pid=6182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.616000 audit[6182]: AVC avc: denied { perfmon } for pid=6182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.616000 audit[6182]: AVC avc: denied { perfmon } for pid=6182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.616000 audit[6182]: AVC avc: denied { perfmon } for pid=6182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.616000 audit[6182]: AVC avc: denied { perfmon } for pid=6182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.616000 audit[6182]: AVC avc: denied { bpf } for pid=6182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.616000 audit[6182]: AVC avc: denied { bpf } for pid=6182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.616000 audit: BPF prog-id=218 op=LOAD Dec 13 14:19:09.616000 audit[6182]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2437 pid=6182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:09.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961356362633532316633656537363239666262396663346466643539 Dec 13 14:19:09.616000 audit: BPF prog-id=218 op=UNLOAD Dec 13 14:19:09.616000 audit: BPF prog-id=217 op=UNLOAD Dec 13 14:19:09.616000 audit[6182]: AVC avc: denied { bpf } for pid=6182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.616000 audit[6182]: AVC avc: denied { bpf } for pid=6182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.616000 audit[6182]: AVC avc: denied { bpf } for pid=6182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.616000 audit[6182]: AVC avc: denied { perfmon } for pid=6182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.616000 audit[6182]: AVC avc: denied { perfmon } for pid=6182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.616000 audit[6182]: AVC avc: denied { perfmon } for pid=6182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.616000 audit[6182]: AVC avc: denied { perfmon } for pid=6182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.616000 audit[6182]: AVC avc: denied { perfmon } for pid=6182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.616000 audit[6182]: AVC avc: denied { bpf } for pid=6182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.616000 audit[6182]: AVC avc: denied { bpf } for pid=6182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:09.616000 audit: BPF prog-id=219 op=LOAD Dec 13 14:19:09.616000 audit[6182]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2437 pid=6182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:09.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961356362633532316633656537363239666262396663346466643539 Dec 13 14:19:09.716349 env[1814]: time="2024-12-13T14:19:09.716285568Z" level=info msg="StartContainer for \"9a5cbc521f3ee7629fbb9fc4dfd59d03b80ff32651bca3f70cb4789b0e879c30\" returns successfully" Dec 13 14:19:17.489703 kubelet[2977]: E1213 14:19:17.489215 2977 controller.go:195] "Failed to update lease" err="Put \"https://172.31.31.121:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-31-121?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 13 14:19:23.434000 audit[5019]: AVC avc: denied { watch } for pid=5019 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_17_01.3740626422/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c884 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c215,c884 tclass=file permissive=0 Dec 13 14:19:23.436582 kernel: kauditd_printk_skb: 47 callbacks suppressed Dec 13 14:19:23.436661 kernel: audit: type=1400 audit(1734099563.434:1600): avc: denied { watch } for pid=5019 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_17_01.3740626422/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c884 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c215,c884 tclass=file permissive=0 Dec 13 14:19:23.434000 audit[5019]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001775f40 a2=fc6 a3=0 items=0 ppid=4375 pid=5019 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c884 key=(null) Dec 13 14:19:23.458069 kernel: audit: type=1300 audit(1734099563.434:1600): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001775f40 a2=fc6 a3=0 items=0 ppid=4375 pid=5019 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c884 key=(null) Dec 13 14:19:23.458261 kernel: audit: type=1327 audit(1734099563.434:1600): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:19:23.434000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274